LO3.3 Flashcards
What are the the four types of cyber security controls?
Physical
Hardware
Software
Encryption
What are three examples of physical cyber security controls?
Biometrics
Swipe Cards
Alarms
What are three examples of hardware cyber security controls?
SmartWater
Cable Locks
Safe
What are three examples of software cyber security controls?
Firewall
Anti-Malware
Operating System Updates
What are three examples of encryption?
Asymmetric encryption
Symmetric encryption
Cryptography
What is the difference between Asymmetric and Symmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses two different keys, a public key for encryption and a private key for decryption
How does cryptography differ to encryption?
Cryptography is coding messages whereas encryption is more specifically making data indecipherable for humans
What are two common procedures in place for cyber security?
Access management
Data Backup
What is access management?
The process of granting authorised users access to a computer system and withholding that same access to unauthorised users
What is data backup?
The process of copying and/or archiving data so they can be restored should the date be lost from a system
How would an organisation mitigate the risks that come from remote and mobile working?
Increased levels of monitoring
Training users in cyber security
Ensuring all mobile devices have a baseline of security configuration
Keep information storage upon a mobile device to a minimum
Encrypt all data