D2 - Protecting Data Flashcards
What is File Permission?
You can set who can access the files and what they can do with them.
What are the 3 main types of file permission and what do they do?
- Read Only: Files can be opened and viewed but not edited
- Read/Write: Files can be opened, viewed and edited
- Full control: Files can be opened, viewed, edited, modified and deleted
what are the benefits of file permission?
protects from all threats, but especially from hacking (malicious way to gain access to data) and accidental damage.
What are Access Levels?
Users are assigned an access level that is associated with their user profile login- which defines what software, data and services they are able to access.
what are the two type pf access level and how much can we access?
- Administrator access : Highest level. User can access all folder with full control. They are able to alter the permission of other users and can install and delete software
-Lowest end level: User have very limited power. They are able to access a limited amount of file and software required to perform task required
What is a benefit of Access Level?
More security is insured due to the fact that users are not permitted to make installs of programs which may be malicious and that they may not have the knowledged about
What is a benefit of Access Level?
More security is insured due to the fact that users are not permitted to make installs of programs which may be malicious and that they may not have the knowledge about
What is backup and recovery procedures?
- To prevent loss of data, organizations and individuals take regulars back up of their data. Back up is the process of copying data and storing it in a secondary location in case of loss or damage to initial data.
- The secondary location is not within the same building. This is known as remote backup, where the data is stored somewhere else to prevent loss in case something happens to the original device
What are the main type of backup and recovery procedures?
- Full Backup: A complete backup of data which provides excellent protection - however can be time consuming and requires a lot of storage
- Incremental Backup: Only data that has been changed since previous backup get saved (e.g editing a word document).Less time consuming and less storage is used up
- Differential backup : A mixture of the two previous back up. e.g at the start of the week make a full backup and throughout the week make incremental backups
Backups can be very long and can cost businesses a lot of money, therefore the time and the type of backup made depends on the business
Passwords
It is a mainly used method of prevention against unauthorized access to their systems, software and user profiles.
It is important to have a strong password, that is not shared, a mixture of letters, characters and numbers and different from different systems
Physical Access Control
Used to protect IT systems. Designed to protect from malicious uses from gaining access to IT systems, such as theft of equipment, loading malware onto systems and stopping hacking can be stopped.
What are the different types of PAC?
- Access Cards: Cards required to be scanned or checked by security guards before gaining access of a site or a room.
- Keypad Access Control: A system that requires a passcode before gaining access, can be used on its own or alongside an access cards
- Biometric Access Control: A system that makes use of biometric data by scanning them to gain access. e.g face id, finger print, iris. Can be used alongside previous methods
- Electronic lock: These is to secure that without the use of the previous method of PAC, doors cannot be unlocked.
What are Digital Certificates?
(Public Key Certificate)
A method to authenticate a user as the owner of the a public key which will allow them to make use of the the public key infrastructure to access secured encrypted communication that is shared over the internet.
They ensure security through digital signature to verify identity
What are Protocols?
A set of rules that defines a method for transmitting data between different devices over a network. These protocols provide a secure encrypted format over the internet. With the use of protocols and public key, ensures that if data is intercepted by malicious users or for not authorized users, data cannot be read or misused
What is an Anti-Virus?
- An utility programs used to prevent malicious software from having an impact on your computer or detect them and removed malicious software that has already infected the computer