What are the different types of techniques to protect your data? ( 7 )
What are File Permissions?
Protection from hacking & accidental damage
What are Access Levels?
Prevents malware
What are Backup & Recovery Procedures?
Full Backup - all data, time consuming, more storage capacity needed
Incremental Backup - data that has changed since previous backup, quicker and less storage
Differential Backup - full backup (once a week) & incremental back (everyday)
What are Passwords?
What are Physical Access Controls?
Access Cards - must be scanned (photo & name)
Keypad Access Control
Biometric Access Control (fingerprint)
Electronic Locks All of the above require this to lock/unlock doors electronically, when signals sent from access control systems
What are Digital Certificates?
(public keycertificates -> from certificate authority)
What are Protocols?
-Secure Sockets Layer, SSL
-Transport Layer Security, TLS, (newer one)
HTTPS, protocol used
What is an Anti-Virus?
Features and Negatives of an Anti-Virus ( 3 features and 3 negatives)
Features:
- Scheduled scans can be set to run automatically
- Full scans initiated on demand for entire hard disk/specific folders
- On access scanning of all files opened/docs, programs (real-time protection)
Negatives:
- Must be regularly maintained & updated for latest virus definitions
- Doesn’t offer total protection - takes time to create new definitions
- Can slow down PC & network performance
What is a FireWall?
Features and Negatives of FireWalls (3 Features and 3 Negatives)
Features:
- Content filtering, certain traffic allowed through
- Controlling which programs can access LAN
- Intruder detection & prevention to identify & stop hackers from gaining access to your network/PC
Negatives:
- Lower network performance if poorly configured
- Less productivity as content may be blocked
- Can’t prevent internal attacks in network. Viruses can change setting on firewall
What is Encryption?
Types of data that is encrypted? ( 2 different types )
Stored Data - data at rest -> symmetric encryption/private key encryption. A certain key is used to encrypt & decrypt data
Negatives:
- If the key is lost, the data can’t be decrypted to plain text form
- Sharing encryption key = less security
Data During Transmission - bank details
public key encryption/ asymmetric, different keys to encrypt and decrypt
Negatives:
- Large amount of data = impact on processing power
Different Legislation & Codes of Practice