protecting data: tools and techniques Flashcards
1
Q
techniques to protecting data; file permissions and access levels
A
- ensure access is restricted to those who need it
2
Q
techniques to protecting data; protocols
A
- define data transfer processes to ensure secure transfer
3
Q
techniques to protecting data; digital certificates
A
- allow secure data transfer using public key encryption
4
Q
techniques to protecting data; physical control
A
- prevent unauthorised access using locks, biometrics etc
5
Q
techniques to protecting data; passwords
A
- limit access by ensuring users keep a secure password to access system
6
Q
techniques to protecting data; back up and recovery procedure
A
- ensure that data can be recovered following any loss of data
7
Q
tools for protecting data; antivirus software
A
- detects and removes viruses and other malware from computer system
- protects systems from forms of malware
- but must be regularly updated as new viruses are created regularly
8
Q
techniques to protecting data; firewalls
A
- monitor network traffic into and out of an IT system and block suspicious traffic
- they prevent hacking attempts
- not 100% effective because security holes can be exploited
9
Q
techniques to protecting data; encryption
A
- conversion of data into unreadable code called cipertext
- encrypted data cannot be read without encryption key
- encryption keys must be maintained and kept secure
10
Q
encryption of stored and transmitted data
A
- encrypt hard disk so anyone who gains access to our system cant read the stored data
- encrypt data while being transmitted so if it is intercepted it can’t be read