LAB2 - Prevention and management of threats to data Flashcards
5 user access restrictions
Physical security measures, passwords, using correct settings and levels of permitted access, biometrics, 2-factor authentication
1 advantage of physical security measures
Prevents attackers from gaining direct and physical access to locations where data is stored
2 disadvantages of physical security measures
Expensive, some methods (CCTV) do not stop data being stolen
3 security techniques for physical security measures
Electronic swipe lock, secured device (steel cable and lock), CCTV camera
2 advantages of passwords
Simple and easy, no costs involved - no specialist hardware required
3 disadvantages of passwords
Only effective if passwords are kept secret, strong or frequently changed passowords may be hard to remember, specialist software may be used to work out passwords
Advantage of using correct settings and levels of permitted access
No problems caused by unauthorised changes
2 disadvantages of using correct settings and levels of permitted access
Technical staff required to set up permissions, access levels need to be set at the right level
5 biometric examples
Voice recognition, retina scan, iris recognition, fingerprint scan, facial recognition
2 advantages of biometrics
Users do not need to remember passwords or update them regularly, cannot be guessed/lost/forgotten
2 disadvantages of biometrics
Expensive - specialist hardware required, some users may feel storing theiir biometric data is an invasion of privacy
3 factors of 2-factor authentication
What you know (PIN/password), what you have (swipe card/mobile phone), who you are (biometric example)
Advantage of 2-factor authentication
Provides a higher level of security
3 disadvantages of 2-factor authentication
Some factors may get lost, take longer to gain access, requires hardware/software
6 data level protection techniques
Firewall, software/interface design, anti-virus software, device hardening, procedures for backing up and recovering data, encryption