Security methods Flashcards

1
Q

Shredding

A
  • mechanical device, cuts papers into strips
  • government, companies, individuals use these to destroy private documents
  • enhances security for a business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy screens

A
  • polarised sheets of plastic placed over a computer screen to stop visibility from any angle other than straight on
  • business industry uses this to ensure people can’t view your computer screen. Reduces hacking, loss of data and snooping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Radio Frequency Identification (RFID)

A
  • small electronic devices made of a small chip and antenna. Carries up to 2000bytes of data
  • provides a unique identification, needs to be scanned to retrieve info
  • reduces cost of replacing keys, generates automated electronic access logs and limit access based on variable factors (specific timing of day in week)
  • manages physical access to buildings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Biometrics

A
  • measures and analyses few human factors (fingerprint, retina/iris, palm prints)
  • allow access to buildings and info held on computer systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Locks

A
  • mechanisms for keeping a door fastened
  • ensures no data is manipulated, stolen or purposely deleted in a room
  • effective at isolating rooms with private info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Antivirus

A
  • program used to prevent, search, detect and remove viruses
  • allows malware scanning of files as they’re being opened for reading and writing updates take place on a regular basis
  • prevents cybercriminals from transmitting viruses and other harmful threats in order to steal sensitive info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A
  • conversion of electronic data into cipher text, hard for unauthorised parties to understand
  • used to retain privacy of digital data stored on computer systems
  • data security, to read an encrypted file you must have a password to decrypt it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls

A
  • network security system designed to prevent unauthorised access to or from a private network
  • filters packets to see if they meet specific criteria set by a series of rules then blocks or allows the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anti Spyware

A
  • detects and eliminates unwanted spyware programs
  • malware installed on a computer without users knowledges in order to collect info
  • key logger records what you type and sends it back to a cyber thief
  • prevent unauthorised users from stealing passwords and etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Usernames/passwords and permissions

A
  • username used to gain access to a computer system. Both P and U needed in multi user systems
  • permissions are rights and privileges. These are access details given by users or network administrators that define access rights to files on a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Token

A
  • small hardware device that the owner holds to authorise access to a network service. May be in form of smart card, or embedded in a key fob
  • user has a PIN, which authorises them as the owner of that certain device. Device displays a number which uniquely identifies the user to the service, letting them log in. ID is changed very often (5mins or so)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly