Section 6 Flashcards
Define ‘logical prevention methods’
This is a computer-based method of protecting data which is normally implementing using software.
Name 4 logical prevention methods (there are 6 altogether):
Password protection
Firewalls
Authentication
Encryption
Access Levels
Anti-Malware software
What is password protection?
• A string of characters that should only be known to the user.
• Strong passwords are advised (numbers, letters, symbols)
• Users are the biggest security danger (because they share passwords, write them down, don’t change them often etc.).
What is a firewall?
• Software that monitors the data packets that enter and leave the network/ computer.
• A firewall is usually built into a computer’s operating system, but dedicated firewall software and hardware can be used.
What is Authentication?
• Methods used to verify the identity of the user and prove that they’re the account holder.
• Methods include CAPTCHA, two-factor authentication (2FA), one-time passcode (OTP).
•Apps from some organisations, such as banks, use this.
What is encryption? How does it work?
• The use of an algorithm to scramble data so it becomes unreadable.
• Data (plain text) is encrypted using an ENCRYPTION Key becoming cypher text. Data is sent across a network and decrypted the other side using a DECRYPTION Key.
What are Access Levels?
• Network administrators can allocate accounts to user which allow them to access specific files and folders. For example, a student account at a school wouldn’t have the same level of privileges as an administrator account.
What is Anti-Malware Software?
• Software that detects malware which can then be quarantined or deleted.
• New viruses are created all the time, so it is essential that software is updated regularly to ensure that it continues to work effectively.
Define ‘physical prevention methods’.
This involves tangible ways of keeping data secure and safe.
Name 4 physical prevention methods (there are 6 altogether):
Locks
CCTV
Backup systems
Biometrics
Security Staff
Location of Hardware
What are locks?
• Locks can be used on doors to computer rooms and server rooms to stop people breaking in and stealing equipment.
• It is also important to lock the room where backups are kept.
• Locks can be unlocked by traditional keys, or opened by codes, key cards, tags, or biometric data.
What is CCTV?
• Cameras inside and outside the rooms can be used to monitor activity 24/7.
• The quality of the image on CCTV can be a factor; using HD monitors and cameras can improve this.
What are backup systems?
• Data can be backed up away from the main location. This could be another site or cloud based.
• If the computers are damaged, the data will still be safe. Even if data is backed up, it is still a disruption to retrieve them.
What are biometrics?
• A scanner can be used to gain access to locked rooms.
• Methods used for access could be facial recognition, iris recognition, and thumb prints.
• It is very useful as the user does not have to carry a key or ID card, and the ID details cannot be passed on to someone else.
What are security staff?
• Security staff could be used to protect computer systems that may contain sensitive data.
• This is an expensive method of security.
What is Location of Hardware?
• Hardware should be stored in a safe location so it cannot be affected by natural disasters.
• It is also sensible to keep computers in a room that does not have large expanses of windows.
• The room should be cool and well ventilated to avoid overheating.
What is a security policy?
Tiawdtidtpiaofst
This is a written document that is designed to protect individuals and organisations from security threats.
Name the three types of policies:
Acceptable Use Policy
Staff training/ responsibilities
Disaster recovery plan
Describe an Acceptable Use Policy.
A set of rules that tells users how to use the network.
Your school will have their own acceptable use policy
Describe Staff training/ responsibilities.
The expectation on staff is to be more responsible when using data and a big part of this is to train staff to become aware of external threats and how best to manage these.
Describe a disaster recovery plan.
A document that outlines how an organisation responds to a cyber-attack, natural disasters or power-cuts.
What are the 2 phases in a disaster recovery plan? Describe them.
Before phase - Putting measures in place in preparation for a disaster. This could be backing up data in another location.
During phase - How to respond if and when a disaster takes place. For example, a backup generator if there is a power cut.
What is confidential computing?
• Confidential computing is an emerging technology used for storing data more securely.
• It’s a cloud computing technology that isolates sensitive data in a protected hardware-based environment (such as the devices we use).
How does confidential computing work?
• Protection of data at rest - encrypting it before storing it in the device itself.
• Protection of data in transit - use of end-to-end encryption.
• Protection in use - encrypting data while being used by RAM or CPU.