Save
IT
Unit 1
LO5
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Sophie _Xx
Visit profile
Cards (14)
Anti-Virus scans
and
removes virus
that could create a
weakness
that can allow
access system
Firewalls block access to unauthorised packets
so that
data cannot be accessed
Anti-Spyware
prevents
spyware
so that the system
cannot be monitored
Username/Passwords/Authentication
so only
authorised users can log on reducing the chances of others accessing the system
Permissions/Levels of Access
- only
authorised users
can
gain access
to a
file reducing
the
chances
of
others accessing
the
files
Encryption
-
scrambles data
so it
can’t be read without
(decryption) key so
even if gathered
cannot be read.
Privacy screens
-
avoid others seeing whats on the screen
Shredding- sensitive documents shreaded
so
nobody can read it later on
Biometrics
are
distinctive
,
measurable human characteristics
like
fingerprints
,
irises
and
voice.
Biometrics reduce the
risk of passwords being shared and used
to
verify a person
Disadvantages
of
biometrics
is that they can be
unrealiable
and
forged
What is
RFID
?
Radio Frequency Identification
How does RFID work?
RFID readers use electromagnetic fields
to
detect tags
or can be used to
unlock doors
in a
key.
Tokens
in
security
can be used to
verify someone
as part of
2-factor authentication