LO5

    Cards (14)

    • Anti-Virus scans and removes virus that could create a weakness that can allow access system
    • Firewalls block access to unauthorised packets so that data cannot be accessed
    • Anti-Spyware prevents spyware so that the system cannot be monitored
    • Username/Passwords/Authentication so only authorised users can log on reducing the chances of others accessing the system
    • Permissions/Levels of Access - only authorised users can gain access to a file reducing the chances of others accessing the files
    • Encryption - scrambles data so it can’t be read without (decryption) key so even if gathered cannot be read.
    • Privacy screens - avoid others seeing whats on the screen
    • Shredding- sensitive documents shreaded so nobody can read it later on
    • Biometrics are distinctive, measurable human characteristics like fingerprints, irises and voice.
    • Biometrics reduce the risk of passwords being shared and used to verify a person
    • Disadvantages of biometrics is that they can be unrealiable and forged
    • What is RFID?

      Radio Frequency Identification
    • How does RFID work?
      RFID readers use electromagnetic fields to detect tags or can be used to unlock doors in a key.
    • Tokens in security can be used to verify someone as part of 2-factor authentication
    See similar decks