Security Methods Flashcards
What are locks?
Locks are a type of physical security, used to secure doors and windows, to ensure that the system can’t be accessed when not in use.
What are biometrics?
Biometrics are a type of physical security that detect human characteristics to allow system access. An example is thumb prints.
What is RFID?
RFID systems can find out the identification of anybody trying to access restricted files on the system without permission.
What are tokens?
Tokens are a type of physical security that are provided to people who need to access facilities within the business, an example is a security card.
What are privacy screens?
Privacy screens are screen filters that prevent other people from seeing what is on your desktop/monitor. In other words, the screen can only be viewed from one angle.
What is shredding?
Shredding is when you physically shred confidential documents in a shredder to dispose of them. This means that if anybody does gain access to the files, they aren’t able to understand them.
What is anti-virus?
Anti-virus is software designed to to protect the system from malware. It detects and removes unidentified files.
What are firewalls?
Firewalls are programs that filter the data packets coming through an internet file to see if they are coming from an authorised source. A firewall can protect the system from hackers, or to ensure workers stay productive.
What is anti-spyware?
Anti-spyware is software that detects and prevents installation of unwanted programs on the system. Also removes any programs that have been installed without the users realisation.
What are usernames/passwords?
The user sets a unique name and password that must be entered in order to gain access to the system. They are unknown to other people.
What are permissions?
Permission is when certain users are allowed certain access to certain files or programs on the system.
What is encryption?
Encryption is when data/plain text is translated into secret code to ensure that if the information falls into the wrong hands, other people can’t understand the text. Only users with the key or code to decrypt the data can read it.