LO5

Cards (14)

  • Anti-Virus scans and removes virus that could create a weakness that can allow access system
  • Firewalls block access to unauthorised packets so that data cannot be accessed
  • Anti-Spyware prevents spyware so that the system cannot be monitored
  • Username/Passwords/Authentication so only authorised users can log on reducing the chances of others accessing the system
  • Permissions/Levels of Access - only authorised users can gain access to a file reducing the chances of others accessing the files
  • Encryption - scrambles data so it can’t be read without (decryption) key so even if gathered cannot be read.
  • Privacy screens - avoid others seeing whats on the screen
  • Shredding- sensitive documents shreaded so nobody can read it later on
  • Biometrics are distinctive, measurable human characteristics like fingerprints, irises and voice.
  • Biometrics reduce the risk of passwords being shared and used to verify a person
  • Disadvantages of biometrics is that they can be unrealiable and forged
  • What is RFID?

    Radio Frequency Identification
  • How does RFID work?
    RFID readers use electromagnetic fields to detect tags or can be used to unlock doors in a key.
  • Tokens in security can be used to verify someone as part of 2-factor authentication