Protecting our data Flashcards
Antivirus
Detects and removes viruses from computers
Real-time scanning checks files to see if they are vulnerable
Deep scans used to check all files/data in a device
Must be regularly updated, protects systems from all types of malware
Firewall
Monitors network traffic in and out of IT system, blocks suspicious traffic
Uses various methods to prevent unwanted malware coming in (packet inspecton)
Can be hardware or software
not accurate 100% of the time, outdated software can be exploited
Encryption
Converts data into unreadable code
most effective form of security, as data can’t be read without a key
if the key is lost, the data is inaccessible
Additional ways of protecting data
File permissions-Settings files to read-only, making them only accessible via passwords
Digital certificates-Unique codes assigned to you by businesses to verify your identity
Protocols
Regularly changing password/login details
Keeping details unique to minimize chances of vulnerability
Not leaving personal details around for others to see, logging off computers
Posting info appropriately online
What are some methods of data breaches
Phishing- Gaining information illegally by making claims via phone or email that entice users into sharing personal data by posing as trusted organizations
Ransomware viruses encrypt people’s data and demand a large sum of money in exchange for the stolen data
Malware-Malicious software that steals users’ data without consent