Save
DATA SECURITY
Measures and Access Control
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Lucia Rufo
Visit profile
Cards (20)
Hardware security
A primary purpose is to prevent
unauthorized access
and
data
breaches
Firewalls
Can be configured to
disallow
certain types of
traffic
by creating
specific
rules or
policies
Backup storage
A crucial rule is to store backups
offline
and in
multiple
locations
Data recovery
Primarily involves
restoring lost
or
corrupted
data
Damage mitigation
Differs from data
recovery
as it involves preventing
damage
while data recovery focuses on
restoring
lost data
Access Control List
(ACL) or whitelist
Helps to
filter
all incoming network traffic based on
predefined
rules
Physical access protection
Can be implemented by
restricting physical access
to
authorized individuals
Biometric access measures
Provide
high accuracy
in
identification
Hardware security protection
Can be implemented by implementing secure
login measures
Firewall configuration
Involves treating rules based on
protocol
,
port
or
IP addresses
Backup strategy
Purpose is to ensure data is
recoverable
in case of
loss
or
corruption
Backup testing
A crucial rule is to confirm the
viability
of
backups
for
data restoration
Data recovery
following system
failure
Identify the cause of
failure
Access Control List
(ACL)
Contributes to
network security
by
restricting access
based on
predefined rules
Physical access protection
Essential for safeguarding sensitive premises by restricting access to
authorized
personnel
Biometric access measures
Enhance
security
as
biometric
data is
harder
to
steal
or
replicate
Whitelist
Allows
access
to
specific approved entities
on a
system
Hardware security protection
Contributes to
mitigating damage
in case of a
security breach
by
limiting damage
and preventing further
intrusion
Firewall configuration
A critical aspect is
restricting access
based on
predefined rules
Backup strategy
Helps in data
recovery
and damage
mitigation
as it provides a means to
restore
data in case of
loss
or
damage