Flashcards in Logical Protection Deck (8)
Tiered Levels Of Access
Giving Different Staff the correct access level means that only people who need access have it complying with the DPA.
This creates a hierarchy of users, usually with a system administrator at the top.
This helps to ensure that the network remains secure and that only licensed software is used on it.
The most popular type of firewall for home users it's a piece of software used to manage the types of incoming information, preventing unauthorised access and unwanted data packets
A physical hardware device that is generally built into broadband routers that filters all incoming data before sending it to the right person on the network
Anti - Malware
Anti-malware software protects against infections caused by many types of malware, including all types of viruses, as well as rootkits, ransomware and spyware. Anti-malware software can be installed on an individual computing device, gateway server or dedicated network appliance.
Obfuscation is the practice of making something difficult to understand.
obfuscation may involve encrypting some or all of the code
Encryption Of Data In Transit
Data in transit refers to data that is being sent between two users. Generally, this could be via email
Encryption Of Data At Rest
Data at rest refers to data that is stored on digital media while it is not being transferred between devices. It is becoming common practice to encrypt data while it is stored, as one can never be sure when a hacker may attempt to get into a device