T6 | Access control, Backup and Recovery Flashcards
Physical access control
Only allowing access to authorised people via electronic locks, keypads, biometrics
Authentication Factors
- Something the user knows (PIN)
- Something the user has (fob)
- Something the user is (biometrics)
How does Fingerprint Recognition work?
Widely used these days. Key features and patterns of print are stored in the system
How do fingerprints work?
Compares fingerprint to find a match (converts prints into binary code)
Disadvantages of using fingerprints
- Light levels may affect recognition rates
- Costs a lot of money
- May need alternative system (backup)
What are the File Permissions
Permissions are “read”, “write/modify/delete” and “execute/run”
Access rights
Permissions that are granted to users on a network
Access levels
Different people will have access to different things
Backups
Are crucial, depending on the company will determine how frequently the backups occur
The 3-2-1 Rule
3 copies of data at all times
2 different storage types
1 copy offsite
Types of backup
Full backup
Incremental backup
Full Backup
Make a copy of all files (very slow - weekly)
Incremental Backup
Only copies changed data (very fast - daily)
Restoring files
Restoring from a full backup is easier, as restoring from incremental takes longer
Cloud Storage
Good solution, data is automatically backed up and most offer a recover service