Save
...
7.5 Digital environments
BIT - Impact, prevention, and management of threats
Data level protection 1
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Dylan Tappenden
Visit profile
Cards (18)
Firewalls
block
suspicious
files
Physical firewalls are generally connected to what?
The
modem
Cons
Firewalls can be too intrusive and restrictive, slowing employees work
Software firewalls take up resources and decrease computer & network performance.
Hardware firewalls can increase network bandwidth
What is an advantage of
firewalls
over
anti-virus
?
Firewalls
can
prevent malware
from
ever
being
downloaded
Obscuring
data
entry - which is replacing data (such as password), with a
*
or • to stop
shoulder surfing
and similar
threats
'Stay
logged
in'
- similar to
autocomplete
but as it is
stored
inside
computer
it can be
stolen
What does an
anti-virus
generally do when it finds
malware
?
Isolate it
What does
signature detection do
?
Looks
for
malware signatures
The main
positive of
security
conscious
interface
design is it can reduce the need for overly
tight security measures
The main negative of
security
conscious design is that focusing on
security
may worsen
ease
of
use
& general
accessibility
Firewalls
work by
monitoring
incoming
and
outgoing
network
traffic
and
blocking
suspicious data based on a
set
of
security
rules
(
whitelist
/
blacklist
)
What is the way
firewalls
work called?
Packet filtering
Pros of
software firewall
Prevents
all forms of
malware
from ever infecting your computer
system.
Usually reasonably
affordable
and relatively
simple
to set
up.
Does the WAN connect directly to the LAN or the hardware
firewall
?
Firewall
there are are two types of firewall?
hardware
and
software
What two types of detection do anti-viruses use?
Heuristic
and
Signature
Autocomplete
- Effective against internal threats like
shoulder surfing
and key
logging
but generally opens up more
external
threats
What does
heuristic detection
do?
Monitors
the
behaviour
of
processes
on your
computer
to spot
malware-like behaviour