D2 - Protecting Data Flashcards
(28 cards)
What is File Permission?
You can set who can access the files and what they can do with them.
What are the 3 main types of file permission and what do they do?
- Read Only: Files can be opened and viewed but not edited
- Read/Write: Files can be opened, viewed and edited
- Full control: Files can be opened, viewed, edited, modified and deleted
what are the benefits of file permission?
protects from all threats, but especially from hacking (malicious way to gain access to data) and accidental damage.
What are Access Levels?
Users are assigned an access level that is associated with their user profile login- which defines what software, data and services they are able to access.
what are the two type pf access level and how much can we access?
- Administrator access : Highest level. User can access all folder with full control. They are able to alter the permission of other users and can install and delete software
-Lowest end level: User have very limited power. They are able to access a limited amount of file and software required to perform task required
What is a benefit of Access Level?
More security is insured due to the fact that users are not permitted to make installs of programs which may be malicious and that they may not have the knowledged about
What is a benefit of Access Level?
More security is insured due to the fact that users are not permitted to make installs of programs which may be malicious and that they may not have the knowledge about
What is backup and recovery procedures?
- To prevent loss of data, organizations and individuals take regulars back up of their data. Back up is the process of copying data and storing it in a secondary location in case of loss or damage to initial data.
- The secondary location is not within the same building. This is known as remote backup, where the data is stored somewhere else to prevent loss in case something happens to the original device
What are the main type of backup and recovery procedures?
- Full Backup: A complete backup of data which provides excellent protection - however can be time consuming and requires a lot of storage
- Incremental Backup: Only data that has been changed since previous backup get saved (e.g editing a word document).Less time consuming and less storage is used up
- Differential backup : A mixture of the two previous back up. e.g at the start of the week make a full backup and throughout the week make incremental backups
Backups can be very long and can cost businesses a lot of money, therefore the time and the type of backup made depends on the business
Passwords
It is a mainly used method of prevention against unauthorized access to their systems, software and user profiles.
It is important to have a strong password, that is not shared, a mixture of letters, characters and numbers and different from different systems
Physical Access Control
Used to protect IT systems. Designed to protect from malicious uses from gaining access to IT systems, such as theft of equipment, loading malware onto systems and stopping hacking can be stopped.
What are the different types of PAC?
- Access Cards: Cards required to be scanned or checked by security guards before gaining access of a site or a room.
- Keypad Access Control: A system that requires a passcode before gaining access, can be used on its own or alongside an access cards
- Biometric Access Control: A system that makes use of biometric data by scanning them to gain access. e.g face id, finger print, iris. Can be used alongside previous methods
- Electronic lock: These is to secure that without the use of the previous method of PAC, doors cannot be unlocked.
What are Digital Certificates?
(Public Key Certificate)
A method to authenticate a user as the owner of the a public key which will allow them to make use of the the public key infrastructure to access secured encrypted communication that is shared over the internet.
They ensure security through digital signature to verify identity
What are Protocols?
A set of rules that defines a method for transmitting data between different devices over a network. These protocols provide a secure encrypted format over the internet. With the use of protocols and public key, ensures that if data is intercepted by malicious users or for not authorized users, data cannot be read or misused
What is an Anti-Virus?
- An utility programs used to prevent malicious software from having an impact on your computer or detect them and removed malicious software that has already infected the computer
How do antiviruses work?
- Signature detection: Malware is analyzed and identify a patter (which is known as signature) for the malware code. Which then is sued to compare to programs on the hard disk to identify the viruses.
- Heuristics detection: Identify malware without the virus signature. This can be done by monitoring the behavior of programs and then detecting anything suspicious
Features of anti viruses:
- Scheduled scans that can be set to run automatically at specific times each day.
- Full scans initiated on demand for your entire hard-disk, specific folders or even external storage devices.
- Full scans initiated on demand for your entire hard-disk, specific folders or even external storage devices.
What are the implications of antiviruses ?
- Must be regularly maintained
- It doesn’t offer total protection
- Can slow down PC and network performance as it occupies a lot of space
What are firewalls?
Hardware devices or utility programs used to monitor incoming and outgoing network traffic and block suspicious traffic. This is done by packets filtering which is when the firewall inspects by inspecting each data packet and compare it to pre-defined security rules, and flag whichever packets that do not follow these rules
What are the main features of firewalls?
- Content filtering is where certain traffic is allowed through and some is not
- Controlling which programs can access the local area network/internet. It can alsomonitor the applications that are listening for incoming network connections
- Controlling which programs can access the local area network/internet. It can alsomonitor the applications that are listening for incoming network connections
What are the implications of firewalls?
- Controlling which programs can access the local area network/internet. It can alsomonitor the applications that are listening for incoming network connections
- Productivity can be impaired as content required to perform a task may be blocked by the firewall
- Firewalls cannot prevent internal attacks from within the network
- Don’t offer total protection
What is encryption?
is where data is converted into an encoded form so as to prevent unauthorized access. There are two types of data we encrypt, and each uses different methods. These two types are stored data and transmitted data
What is stored data?
also known as data at rest, sometimes needs to be encrypted. While you might feel it is secure on your computer, if someone gains access to it, they will be able to read any data on your device
- Stored data is usually encrypted using symmetric encryption. This is also sometimes known as private-key encryption. With symmetric encryption, we use the same key to both encrypt and decrypt the data
What are the implications to encrypting data at rest (stored data)?
- If you lose the encryption key then you will never be able to decrypt your data back to its original plaintext form. The data will be gone forever.
- The sharing of the encryption key can compromise security as the key could be intercepted. This is why we don’t use it for encrypting data during transmission.