Access levels use levels of access, each protected by a username and password to ensure that only authorised users can access the key data
Anti-spyware software detects and removes spyware using two methods.
Rules: looks for certain features associated with spyware
File structures: looks for file structures common in spyware
Spyware also prevents the downloading of spyware, encrypts files and keyboard strokes, blocks access to webcams and microphones if necessary and scans for signs that personal data has been stolen to warn the user
Authentication refers to the ability of users to prove who they are. Three factors are used: something a user knows, something a user, has and something unique to the user
Passwords are the most common form of authentication. They should be changed regularly, difficult to guess and contain special characters. Passwords are often entered twice to verify them
Two step verification uses two different kinds of authentication are used to verify the user's identity. For example, when pins are sent to a users email to allow them to log in to a website
Automatic software updates keep data secure by ensuring that the most up to date anti-malware software is running. Often carried out overnight
Users should check spelling and tone of communication and URLs. Typo squatting (e.g Goggle or Amoozon) is used to make the website seem genuine. Grammar should also be checked.
Firewalls can be either software or hardware and they sit between the user’s computer and an external network. Primary defence to any computer system from any cybercriminal activity.
Firewalls:
Examine all “traffic” between the computer and external network
If traffic doesn’t meet criteria, it is blocked and a warning is sent to the user
Keeps lists of undesirable IPs and prevents access to these websites
Can prevent viruses and hackers
Maintain a log so that users can check daily activity
Firewalls cannot prevent harmful traffic if individuals bypass the network’s firewall, in cases of employee misconduct or carelessness or if the firewall is disabled
Proxy Servers are an intermediate between a user and a web server which filters Internet traffic, keeps user’s IP secret, and prevents direct access to a web server by being between the user and the server
Proxy servers can block requests from certain IP addresses, act as a firewall and direct away invalid traffic
If a cyberattack is launched, the proxy server is affected instead of the web server, securing the web server
Proxy servers use a “cache” to store web pages that have already been visited and then deliver it to the client quicker
Privacy settings are controls available on web browsers and websites that are designed to limit who can access and see a user’s personal data
Privacy settings can include preventing location sharing, preventing websites collecting browsing data and advertising opt-outs
Secure Socket Layer is a type of protocol used for secure communication across networks. When a user logs into a website, SSL encrypts the data, which is seen as a green padlock or https in the address window
SSL certificates are a form of digital certification used to authenticate a website. SSL is used during online banking, online shopping, using cloud storage or using VoIP
The users browser sends a message to connect with the SSL secured website, the browser then requests that the webserveridentifies itself. The web server sends a copy of its SSL certificate to the user’s browser. If this is authenticated, the browser sends a message to the server and the two acknowledge each other, and data transfer begins.