B2 Prevention and management of data Flashcards

1
Q

User access restrictions

A

Physical security measures (locks)
Passwords
Using correct settings and levels of permitted access
Access rights & Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access rights

A

Programs can allow certain levels of access to different users so that they are limited to the data they can see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Permissions

A

Folders can be set up to only allow different types of access to certain users e.g. read/write/delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Authentication?

A

Authentication is used to verify the identity of the user. They are identified with a username and this is authenticated with the use of a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Two-Factor Authentication?

A

Two-factor authentication is a second layer of security involving something the user knows e.g. password, and something the user possesses e.g. sending a code via SMS or email to a phone or computer. Small devices can produce a code, known as a token, to be input as the 2nd factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall

A

The job of a firewall is to stop unwanted packages of data entering the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data level protection?

A

Software/interface design
Auto complete
‘ Stay logged in’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly