6.6 - Logical protection/Digital security Flashcards
Usernames and Passwords
Strong usernames passwords - less chance of unauthorised users accessing a system.
Password: contain a mix of uppercase, lowercase letters, punctuation and numbers / long length and be changed regularly
Anti Malware
scan, detect and remove any viruses from the system.
anti spyware:
removes spyware on an infected system so hackers cannot view personal data or monitor users.
organisations should install and regularly update anti virus and anti spyware programs.
Firewall
prevents unauthorised access to a form of network by filtering data packets and block anything that is identified as harmful to the computer system or network. / block specific websites
Encryption
converting data into an unreadable format so it cannot be understood without a decryption key.
What is encryption at rest
Data is encrypted while it is being stored on a system or storage drive.
What is encryption in transit
securing data as it is being transferred between systems on a network
Tiered levels of access
Purpose: grant different types of permission to certain users / only authorised people can access and change certain files.
Different levels of file access:
- No access
- Read only : Allow a user to view but not edit
- Read/write: Allow a user to view and edit
Obfuscation
When data is deliberately changed to be unreadable to humans but still understandable by computers.
Specialist software can be used to obfuscate data and convert it back into a human readable format.