cybersecurity Flashcards
firewall
separates trusted network from untrusted network (normally the Internet)
data is sent around a network in small packets of information
- these packets are checked to see where they are coming from and going to
- packets that don’t match filtering rules are dropped
the firewall will detect packets from malicious computers
what can a firewall be ran on (two types and their disadvantages)
firewalls can be run on dedicated hardware or as software
- this may be a dedicated unit to the task of being a firewall
- alternatively, it may be built into other devices such as a home Wi-Fi router
Dedicated hardware firewalls are expensive
Software firewalls will slow down a computer
firewall capabilities
Prevent attackers from gaining access to computers on a network
Can block certain malicious computers by filtering packets from a certain IP (Internet Protocol) address
Can prevent access to certain ports on the network. This is known as port blocking
Malicious or inappropriate websites can be blocked
aup (acceptable use policy)
lets everyone in an organisation know the rules related to their IT systems.
it aims to:
Improve system security by getting people to act correctly
Explain what happens if people act incorrectly
data protection act
Data Protection Act (2018) gives a number of rights:
The right to view data stored about you by organisations
The right to withdraw consent – this allows you to be removed from a mailing list
The right to make changes to your data if it is inaccurate
The right to be forgotten – this allows you to delete your personal data