T6 | Access control, Backup and Recovery Flashcards
Physical access control
Only allowing access to authorised people via electronic locks, keypads, biometrics
Authentication Factors
- Something the user knows (PIN)
- Something the user has (fob)
- Something the user is (biometrics)
How does Fingerprint Recognition work?
Widely used these days. Key features and patterns of print are stored in the system
How do fingerprints work?
Compares fingerprint to find a match (converts prints into binary code)
Disadvantages of using fingerprints
- Light levels may affect recognition rates
- Costs a lot of money
- May need alternative system (backup)
What are the File Permissions
Permissions are “read”, “write/modify/delete” and “execute/run”
Access rights
Permissions that are granted to users on a network
Access levels
Different people will have access to different things
Backups
Are crucial, depending on the company will determine how frequently the backups occur
The 3-2-1 Rule
3 copies of data at all times
2 different storage types
1 copy offsite
Types of backup
Full backup
Incremental backup
Full Backup
Make a copy of all files (very slow - weekly)
Incremental Backup
Only copies changed data (very fast - daily)
Restoring files
Restoring from a full backup is easier, as restoring from incremental takes longer
Cloud Storage
Good solution, data is automatically backed up and most offer a recover service
Cloud Backup
Involves sending a copy of the data via the internet to a server
Disaster Recovery Plan
Documents the procedures to be followed in the event of a disaster
Recovery time
Acceptable recovery time will vary from seconds to days
Benefits of DRP
- Lower stress
- Minimises risk of delay
- Reduces potential legal liabilities
Implications of Disasters
- Paper records destroyed
- Hardware replacing needed
- New premises (or temporary)
- Software settings reconfigured