Chap 5.3 - solutions to cyber security threats Flashcards
Access control and levels
-hierarchy of different access levels through password to prevent unauthorised access
-important in organisation- keep data relevant to worker
-social networks in privacy settings- public access, friends, customs, data owner
anti malware function
detect and remove malware
anti virus function
-full system checks once a week and updates
-compare virus against signature files ( database of known viruses)
-do heuristics checking - check behaviors for possible viruses
-possible infected file are quarantined- automatically deleted, or asks user’s permission - maybe a false positive
anti spyware function
-detect, remove and prevent installation of illegal spyware softwares
-encrypts file and keyboard strokes
-scans and warns uses of stolen information
-identifies spyware through file structure or typical features related to spyware
authentication and how it works
-process of confirming user’s identity before allowing access
-user need to have something have, know, unique to them
ways passwords are kept safe for authentification
-change frequently
-run anti- spyware
-shown as * on screen for privacy
-finite amount of tries
-has to match with user name
biometrics and how it is done
-using physical charastics for access
-fingerprint scans
-retina scans
-face recognition
-voice recognition
how does fingerprint scans work, good and bad
-image is compared to image stored in database
-1 in 5000 accuracy
good - person always has them, difficult to replicate, unique to each person, easy to use, small storage requirement
bad - mistakes if skin is dirty, damaged fingerprints
how does retina scans work, good and bad
-use infrared light to scan blood vessels in the eyes
-person has to be still for 10 - 15 s
-1 in 10 000 000 accuracy
good - high accuracy, cannot replicate blood vessels
bad - intrusive, expensive installation, long time to verify
how does face recognition scans work, good and bad
good- non- intrusive, inexpensive
bad - affected by lighting, hair , age changes, glasses
how does voice recognition scans work, good and bad
- good - non- intrusive, short to verify, inexpensive
- bad - voice can be recorded and used, low accuracy, illnesses affecting voice
2 step verification
-authentication that requires 2 methods of verification to prove user’s identity
-user has to enter username and password
-8 digit pin is sent to user via email/ phone no. which they can enter to get access
automatic software updates
-softwares on device are updated
-done overnight or when device is of
-may contain patches
what do patches do
update software security/ improve performance
bad of automatic software updates
-disrupts device after n=installation, losing existing data