Logical Protection Flashcards
Tiered Levels Of Access
Giving Different Staff the correct access level means that only people who need access have it complying with the DPA.
This creates a hierarchy of users, usually with a system administrator at the top.
This helps to ensure that the network remains secure and that only licensed software is used on it.
Software Firewall
The most popular type of firewall for home users it’s a piece of software used to manage the types of incoming information, preventing unauthorised access and unwanted data packets
Physical Firewall
A physical hardware device that is generally built into broadband routers that filters all incoming data before sending it to the right person on the network
Anti - Malware
Anti-malware software protects against infections caused by many types of malware, including all types of viruses, as well as rootkits, ransomware and spyware. Anti-malware software can be installed on an individual computing device, gateway server or dedicated network appliance.
Obfuscation
Obfuscation is the practice of making something difficult to understand.
obfuscation may involve encrypting some or all of the code
Encryption Of Data In Transit
Data in transit refers to data that is being sent between two users. Generally, this could be via email
Encryption Of Data At Rest
Data at rest refers to data that is stored on digital media while it is not being transferred between devices. It is becoming common practice to encrypt data while it is stored, as one can never be sure when a hacker may attempt to get into a device
Password Protection
A password could be applied to the file, folder or storage device on which the file is held. This method of protection is effective if the password is strong, and, in most cases, dissuades the casual hacker who simply wants to take a look at your data.