Security methods Flashcards
1
Q
Shredding
A
- mechanical device, cuts papers into strips
- government, companies, individuals use these to destroy private documents
- enhances security for a business
2
Q
Privacy screens
A
- polarised sheets of plastic placed over a computer screen to stop visibility from any angle other than straight on
- business industry uses this to ensure people can’t view your computer screen. Reduces hacking, loss of data and snooping
3
Q
Radio Frequency Identification (RFID)
A
- small electronic devices made of a small chip and antenna. Carries up to 2000bytes of data
- provides a unique identification, needs to be scanned to retrieve info
- reduces cost of replacing keys, generates automated electronic access logs and limit access based on variable factors (specific timing of day in week)
- manages physical access to buildings
4
Q
Biometrics
A
- measures and analyses few human factors (fingerprint, retina/iris, palm prints)
- allow access to buildings and info held on computer systems
5
Q
Locks
A
- mechanisms for keeping a door fastened
- ensures no data is manipulated, stolen or purposely deleted in a room
- effective at isolating rooms with private info
6
Q
Antivirus
A
- program used to prevent, search, detect and remove viruses
- allows malware scanning of files as they’re being opened for reading and writing updates take place on a regular basis
- prevents cybercriminals from transmitting viruses and other harmful threats in order to steal sensitive info
7
Q
Encryption
A
- conversion of electronic data into cipher text, hard for unauthorised parties to understand
- used to retain privacy of digital data stored on computer systems
- data security, to read an encrypted file you must have a password to decrypt it
8
Q
Firewalls
A
- network security system designed to prevent unauthorised access to or from a private network
- filters packets to see if they meet specific criteria set by a series of rules then blocks or allows the data
9
Q
Anti Spyware
A
- detects and eliminates unwanted spyware programs
- malware installed on a computer without users knowledges in order to collect info
- key logger records what you type and sends it back to a cyber thief
- prevent unauthorised users from stealing passwords and etc
10
Q
Usernames/passwords and permissions
A
- username used to gain access to a computer system. Both P and U needed in multi user systems
- permissions are rights and privileges. These are access details given by users or network administrators that define access rights to files on a network
11
Q
Token
A
- small hardware device that the owner holds to authorise access to a network service. May be in form of smart card, or embedded in a key fob
- user has a PIN, which authorises them as the owner of that certain device. Device displays a number which uniquely identifies the user to the service, letting them log in. ID is changed very often (5mins or so)