Logical Protection Flashcards

1
Q

Tiered Levels Of Access

A

Giving Different Staff the correct access level means that only people who need access have it complying with the DPA.

This creates a hierarchy of users, usually with a system administrator at the top.

This helps to ensure that the network remains secure and that only licensed software is used on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software Firewall

A

The most popular type of firewall for home users it’s a piece of software used to manage the types of incoming information, preventing unauthorised access and unwanted data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Firewall

A

A physical hardware device that is generally built into broadband routers that filters all incoming data before sending it to the right person on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti - Malware

A

Anti-malware software protects against infections caused by many types of malware, including all types of viruses, as well as rootkits, ransomware and spyware. Anti-malware software can be installed on an individual computing device, gateway server or dedicated network appliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Obfuscation

A

Obfuscation is the practice of making something difficult to understand.

obfuscation may involve encrypting some or all of the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption Of Data In Transit

A

Data in transit refers to data that is being sent between two users. Generally, this could be via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption Of Data At Rest

A

Data at rest refers to data that is stored on digital media while it is not being transferred between devices. It is becoming common practice to encrypt data while it is stored, as one can never be sure when a hacker may attempt to get into a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password Protection

A

A password could be applied to the file, folder or storage device on which the file is held. This method of protection is effective if the password is strong, and, in most cases, dissuades the casual hacker who simply wants to take a look at your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly