Why are tools and techniques used?
What are software and hardware used?
What are the techniques used for promoting data?
(Techniques for protecting data)
What does Back and recovery procedures ensure?
(Techniques for protecting data)
Back and recovery procedures - Ensure that data can be recovered following any loss of data
What are Passwords?
(Techniques for protecting data)
Passwords - Limit access by ensuring users keep a secure password to access system
What does Physical access control prevent?
(Techniques for protecting data)
Physical access control - Prevent unauthorised access using locks, biometrics, etc.
What does Digital certificates allow?
(Techniques for protecting data)
Digital certificates - Allow secure data transfer using public key encryption
What does Protocols mean?
(Techniques for protecting data)
Protocols - Define data transfer processes to ensure secure transfer
What Protocols File permission and access levels ensure?
(Techniques for protecting data)
File permission and access levels - Ensure access is restricted to those who need it
What does Biometric authentication identify?
(Techniques for protecting data)
Biometric authentication - identifies individual’s unique fingerprint patterns
What are the 3 tools for protecting data?
(Tools for protecting data)
What is the description of Antivirus Software?
(Tools for protecting data)
Detects and removes viruses and other malware from a computer systems
What is the reason for using Antivirus Software?
(Tools for protecting data)
Protects systems from all forms of malware
What do you need to be aware of when using Antivirus Software?
(Tools for protecting data)
Must be regularly updated new viruses are created regularly.
What is the description of Firewalls?
(Tools for protecting data)
Monitors network traffic into and out of an IT system; block suspicious traffic to prevent unauthorised access
What is the reason for using Firewalls?
(Tools for protecting data)
Firewalls are key in preventing hacking attempts as well as worms
What do you need to be aware of when using Firewalls?
(Tools for protecting data)
Firewalls are not 100% effective - security holes can be exploited, e.g. in outdated software
What is the description of Encryption?
(Tools for protecting data)
The conversion of data into an unreadable code known as ciphertext
What is the reason for using Encryption?
(Tools for protecting data)
The most effective form of security, as encrypted data cannot be read without the encryption key
What do you need to be aware of when using Encryption?
(Tools for protecting data)
Encryption keys must be maintained and kept secure. A lost key means the data is irretrievable
Why do we encrypt hard disk?
(Encryption of stored and transmitted data)
Why do we encrypt data while is is being transmitted?
(Encryption of stored and transmitted data)
We encrypt data while it is being transmitted so that if it is intercepted it cannot be read