Measures and Access Control

Cards (20)

  • Hardware security
    A primary purpose is to prevent unauthorized access and data breaches
  • Firewalls
    • Can be configured to disallow certain types of traffic by creating specific rules or policies
  • Backup storage
    A crucial rule is to store backups offline and in multiple locations
  • Data recovery
    Primarily involves restoring lost or corrupted data
  • Damage mitigation
    Differs from data recovery as it involves preventing damage while data recovery focuses on restoring lost data
  • Access Control List (ACL) or whitelist

    • Helps to filter all incoming network traffic based on predefined rules
  • Physical access protection
    Can be implemented by restricting physical access to authorized individuals
  • Biometric access measures
    • Provide high accuracy in identification
  • Hardware security protection
    Can be implemented by implementing secure login measures
  • Firewall configuration
    • Involves treating rules based on protocol, port or IP addresses
  • Backup strategy
    Purpose is to ensure data is recoverable in case of loss or corruption
  • Backup testing
    • A crucial rule is to confirm the viability of backups for data restoration
  • Data recovery following system failure
    Identify the cause of failure
  • Access Control List (ACL)

    • Contributes to network security by restricting access based on predefined rules
  • Physical access protection
    Essential for safeguarding sensitive premises by restricting access to authorized personnel
  • Biometric access measures
    • Enhance security as biometric data is harder to steal or replicate
  • Whitelist
    Allows access to specific approved entities on a system
  • Hardware security protection
    Contributes to mitigating damage in case of a security breach by limiting damage and preventing further intrusion
  • Firewall configuration
    • A critical aspect is restricting access based on predefined rules
  • Backup strategy
    Helps in data recovery and damage mitigation as it provides a means to restore data in case of loss or damage