LO6 6.6 Logical protection Flashcards
Tiered levels of access to data
-grant different types of permission to certain users
different access file levels
1 no access
2 read only - view not edit
3 read/write - view and edit
Firewall
-prevent unauthorised access to or from a network
-filter data packets and block anything that is harmful
used to block access to specific sites and programs
can be form of a physical device which is connected to network
or software installed
Anti-Malware
scans a system and removes viruses
anti spyware removes spyware so hackers cannot view data
organisations should install and update regularly
Obfuscation
data is deliberately changed to be unreadable to humans but still understandable by computers
specialist software can be used for this
Encryption
conversion of data into an unreadable format
can only be understood by an authorised system with a decryption key
Encryption at rest
data is encrypted while it is being stored on a system or storage device
Encryption in transit
is to secure data as it is being transferred between systems or on a network
Usernames and passwords
usernames must be watched with a secure password to minimise unauthorised access from hackers
should contain letters, punctuation and numbers
needs to be regularly
Electronic data shredding
removing data securely from access if hard drives or systems are passed on
required to comply with data protection act