government, companies, individuals use these to destroy private documents
enhances security for a business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Privacy screens
A
polarised sheets of plastic placed over a computer screen to stop visibility from any angle other than straight on
business industry uses this to ensure people can’t view your computer screen. Reduces hacking, loss of data and snooping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Radio Frequency Identification (RFID)
A
small electronic devices made of a small chip and antenna. Carries up to 2000bytes of data
provides a unique identification, needs to be scanned to retrieve info
reduces cost of replacing keys, generates automated electronic access logs and limit access based on variable factors (specific timing of day in week)
manages physical access to buildings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Biometrics
A
measures and analyses few human factors (fingerprint, retina/iris, palm prints)
allow access to buildings and info held on computer systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Locks
A
mechanisms for keeping a door fastened
ensures no data is manipulated, stolen or purposely deleted in a room
effective at isolating rooms with private info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Antivirus
A
program used to prevent, search, detect and remove viruses
allows malware scanning of files as they’re being opened for reading and writing updates take place on a regular basis
prevents cybercriminals from transmitting viruses and other harmful threats in order to steal sensitive info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Encryption
A
conversion of electronic data into cipher text, hard for unauthorised parties to understand
used to retain privacy of digital data stored on computer systems
data security, to read an encrypted file you must have a password to decrypt it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Firewalls
A
network security system designed to prevent unauthorised access to or from a private network
filters packets to see if they meet specific criteria set by a series of rules then blocks or allows the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Anti Spyware
A
detects and eliminates unwanted spyware programs
malware installed on a computer without users knowledges in order to collect info
key logger records what you type and sends it back to a cyber thief
prevent unauthorised users from stealing passwords and etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Usernames/passwords and permissions
A
username used to gain access to a computer system. Both P and U needed in multi user systems
permissions are rights and privileges. These are access details given by users or network administrators that define access rights to files on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Token
A
small hardware device that the owner holds to authorise access to a network service. May be in form of smart card, or embedded in a key fob
user has a PIN, which authorises them as the owner of that certain device. Device displays a number which uniquely identifies the user to the service, letting them log in. ID is changed very often (5mins or so)