B2 Prevention and management of data Flashcards
User access restrictions
Physical security measures (locks)
Passwords
Using correct settings and levels of permitted access
Access rights & Permissions
Access rights
Programs can allow certain levels of access to different users so that they are limited to the data they can see
Permissions
Folders can be set up to only allow different types of access to certain users e.g. read/write/delete
What is Authentication?
Authentication is used to verify the identity of the user. They are identified with a username and this is authenticated with the use of a password
What is Two-Factor Authentication?
Two-factor authentication is a second layer of security involving something the user knows e.g. password, and something the user possesses e.g. sending a code via SMS or email to a phone or computer. Small devices can produce a code, known as a token, to be input as the 2nd factor.
Firewall
The job of a firewall is to stop unwanted packages of data entering the network
What is data level protection?
Software/interface design
Auto complete
‘ Stay logged in’