Save
...
Unit 7 - digital environments
7.5 Digital environments
BIT - Impact, prevention, and management of threats
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Dylan Tappenden
Visit profile
Subdecks (6)
BIT - Disaster recovery policy
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
5 cards
Data protection 2
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
13 cards
Data level protection 1
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
18 cards
Authentication
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
7 cards
Levels of access
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
1 card
User access
T-Level DPDD > Paper 2 > Unit 7 - digital environments > 7.5 Digital environments > BIT - Impact, prevention, and management of threats
3 cards
Cards (57)
User access restriction:
Physical
security (locks)
Passwords
Settings
and levels of
access
Biometrics
2fa
3 examples of 2FA
Verification
email
Google
authenticator
Security
question
Ethical
hackers are referred to as
White-hat
- hired by company
Grey-hat
-
not
hired but will tell issues found for a price
Penetration testing is an example of what?
Weakness finding
Disaster
recovery
policy
is a plan to
limit
the
damage
when a
disaster
occurs
What two techniques do cloud services try and make systems more
secure
?
2 factor authentication
Send notification
when
file
is
uploaded
Why might data be less secure when stored using
cloud services
?
Data
is available through the internet
In the context of a disaster recovery policy, what does disaster mean?
Damage
to any
servers
One way to avoid
phishing
is by having employees check the email to see if it is correct
Another way is to have a blackmail list
Possible impacts of security breach include:
Damage
to
public image
Financial
and
data loss
Reduction
in
productivity
Downtime
Legal action
See all 57 cards