D2 - Protecting Data Flashcards
What are the different types of techniques to protect your data? ( 7 )
- file permissions
- access levels
- backup & recovery procedures
- passwords
- physical access controls
- digital certificates
- protocols
What are File Permissions?
- Set who can access certain files
- Read-Only: can be opened & viewed
- Read/Write: can be opened, viewed & edited
- Full Control: can be opened, viewed, edited, modified & deleted
Protection from hacking & accidental damage
What are Access Levels?
- Who can access what on user profile login including software, data, service
- Highest level= administrator access, a user can access all folders-full control, alter permissions of users & install/delete software
Prevents malware
What are Backup & Recovery Procedures?
- Copy of data in a secondary location to original one ( cloud = remote backup)
Full Backup - all data, time consuming, more storage capacity needed
Incremental Backup - data that has changed since previous backup, quicker and less storage
Differential Backup - full backup (once a week) & incremental back (everyday)
What are Passwords?
- they must be shared/write it down
- use different passwords for different user accounts
- minimum 8-10 characters length
- uppercase, lowercase letters, numbers & symbols
What are Physical Access Controls?
Access Cards - must be scanned (photo & name)
Keypad Access Control
Biometric Access Control (fingerprint)
Electronic Locks All of the above require this to lock/unlock doors electronically, when signals sent from access control systems
- Prevents malicious users, theft of equip, loading malware onto system
What are Digital Certificates?
(public keycertificates -> from certificate authority)
- To authenticate a user as owner of a public key, can use public key infrastructure for secure encrypted communication over internet ( HTTPS, S=Secure)
- Digital signature & public key verifies senders identity
What are Protocols?
- Set of rules defines a method for transmitting data over internet
-Secure Sockets Layer, SSL
-Transport Layer Security, TLS, (newer one)
HTTPS, protocol used
- Prevents malicious user reading & misusing data if intercepted
What is an Anti-Virus?
- Utility Program, prevents malicious software infecting PC & removes malicious software
- It analyses malware & identifies a pattern for the malware code & compares it to programs on your hard disk to identify viruses
Features and Negatives of an Anti-Virus ( 3 features and 3 negatives)
Features:
- Scheduled scans can be set to run automatically
- Full scans initiated on demand for entire hard disk/specific folders
- On access scanning of all files opened/docs, programs (real-time protection)
Negatives:
- Must be regularly maintained & updated for latest virus definitions
- Doesn’t offer total protection - takes time to create new definitions
- Can slow down PC & network performance
What is a FireWall?
- Hardware / Utility device, monitors incoming & outgoing network traffic & blocks anything suspicious
- Packet filtering - firewall inspects each data packet of data & compares it to pre-defined security rules. If a packet is flagged it stops it from passing through the firewall
Features and Negatives of FireWalls (3 Features and 3 Negatives)
Features:
- Content filtering, certain traffic allowed through
- Controlling which programs can access LAN
- Intruder detection & prevention to identify & stop hackers from gaining access to your network/PC
Negatives:
- Lower network performance if poorly configured
- Less productivity as content may be blocked
- Can’t prevent internal attacks in network. Viruses can change setting on firewall
What is Encryption?
- Data that is converted to coded form to prevent unauthorised access
Types of data that is encrypted? ( 2 different types )
Stored Data - data at rest -> symmetric encryption/private key encryption. A certain key is used to encrypt & decrypt data
Negatives:
- If the key is lost, the data can’t be decrypted to plain text form
- Sharing encryption key = less security
Data During Transmission - bank details
public key encryption/ asymmetric, different keys to encrypt and decrypt
Negatives:
- Large amount of data = impact on processing power
Different Legislation & Codes of Practice
- Data Protection Act 1998 , how individuals data can be handled and used
- Computer Misuse Act 1990 , Protects againsts harm & damage of IT Systems & data
- Informations Commissioners Office (ICO) , responsible for enforcing data protection act & codes of practice