Logical Protection Flashcards Preview

UNIT 2 ICT > Logical Protection > Flashcards

Flashcards in Logical Protection Deck (8)
Loading flashcards...

Tiered Levels Of Access

Giving Different Staff the correct access level means that only people who need access have it complying with the DPA.

This creates a hierarchy of users, usually with a system administrator at the top.

This helps to ensure that the network remains secure and that only licensed software is used on it.


Software Firewall

The most popular type of firewall for home users it's a piece of software used to manage the types of incoming information, preventing unauthorised access and unwanted data packets


Physical Firewall

A physical hardware device that is generally built into broadband routers that filters all incoming data before sending it to the right person on the network


Anti - Malware

Anti-malware software protects against infections caused by many types of malware, including all types of viruses, as well as rootkits, ransomware and spyware. Anti-malware software can be installed on an individual computing device, gateway server or dedicated network appliance.



Obfuscation is the practice of making something difficult to understand.

obfuscation may involve encrypting some or all of the code


Encryption Of Data In Transit

Data in transit refers to data that is being sent between two users. Generally, this could be via email


Encryption Of Data At Rest

Data at rest refers to data that is stored on digital media while it is not being transferred between devices. It is becoming common practice to encrypt data while it is stored, as one can never be sure when a hacker may attempt to get into a device


Password Protection

A password could be applied to the file, folder or storage device on which the file is held. This method of protection is effective if the password is strong, and, in most cases, dissuades the casual hacker who simply wants to take a look at your data.