Save
Protecting Data Techniques
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Kadiatu Kebe
Visit profile
Cards (21)
File
permissions
Protect IT systems
from
threats
like hacking and accidental damage
View source
File
permissions
Read
only
Read/
Write
Full Control
View source
Read
only files
Can be opened and viewed, but not
edited
View source
Read
/Write files
Can be
opened
, viewed and
edited
View source
Full
Control files
Can be opened, viewed,
edited
, modified and
deleted
View source
Access
Levels
Define which
software
, data and
services
users can access
View source
Administrator
access
Users can access all folders, alter
permissions
and
install
/delete software
View source
Lowest
level access
Users can only access a
limited
number files and software needed to do their
job
View source
Backup
Taking a
copy
of data and storing it in a
secondary
location
View source
Backup
procedures
Full
Backup
Incremental
Backup
Differential
Backup
View source
Full
Backup
Complete backup of data, provides excellent protection but is time-consuming and requires
large
storage
View source
Incremental
Backup
Backup of data that has
changed
since the previous backup, requires less storage and is
quicker
View source
Differential
Backup
Mixture
of Incremental and full backup, usually used by
businesses
View source
Physical
access controls
Access Cards
Keypad Access Control
Biometric Access Control
View source
Access
Cards
Cards that must be scanned to unlock rooms, can be encoded and used for
identification
View source
Keypad
Access Control
Requires a
passcode
to gain entry, can be used with or instead of
access cards
View source
Biometric Access Control
Scans
biometric
data to gain
access
(e.g. fingerprint, iris or facial recognition)
View source
Electronic Locks
Unlock/lock doors electronically when sent signals from any
access control system
View source
Digital
Certificates
Used to authenticate a user as the owner of a
public key
, allowing use of the
public key infrastructure
(PKI)
View source
Protocols
Set of
rules
that defines a method for
transmitting
data between different devices over a network
View source
Transport Layer Security (TLS) and
Secure
Sockets Layers (
SSL
)
Provide a secure connection between two computing devices so data can be transmitted in a secure
encrypted
format over the
internet
View source
See similar decks
Protecting Data Techniques
52 cards
Lesson 19 Protecting data techniques
Unit 1
42 cards
3.1.3 Data Analysis Techniques
AQA A-Level English Language > Unit 3: Language in Action > 3.1 Language Investigation
75 cards
11.2.1 Data mining techniques
AQA A-Level Computer Science > 11.0 Big Data > 11.2 Data analytics
35 cards
3.2 Data Collection Techniques
Edexcel A-Level English Language > Unit 3: Investigating Language
31 cards
7.2 Data Collection Techniques
AQA A-Level Environmental Science > 7. Research Methods
160 cards
8.2.2 Data protection laws
AQA A-Level Computer Science > 8.0 Consequences of uses of computing > 8.2 Legal issues
56 cards
3.2 Data Analysis
OCR GCSE Sociology > 3. Applying Sociological Research Techniques
116 cards
7.1 Exam Techniques
Edexcel GCSE Economics > 7. Assessment Preparation
181 cards
3.2.2 Compositional Techniques
AQA A-Level Music > 3. Composition > 3.2 Free Composition
51 cards
4.1.1 Quantitative data
GCSE Physical Education > 4. Use of data > 4.1 Types of data
42 cards
2.2.1 Programming techniques
OCR A-Level Computer Science > 2.2 Problem-solving and programming
91 cards
7.2 Sampling Techniques
Edexcel GCSE Sociology > 7. Research Methods
86 cards
1.4.9 Data Handling
AQA GCSE Psychology > Unit 1: Cognition and Behaviour > 1.4 Research Methods
147 cards
1.4.1 Data types
OCR A-Level Computer Science > 1.4 Data types, data structures and algorithms
94 cards
2.2 Data Compression
AP Computer Science Principles > Big Idea 2: Data
53 cards
Exploring data compression
OCR GCSE Computer Science > 1.2 Memory and Storage > 1.2.4 Data Storage
59 cards
4.3 Presenting data
AQA GCSE Physical Education > 4. Use of data
168 cards
7.3 Data Analysis
AQA A-Level Environmental Science > 7. Research Methods
235 cards
4.4.1 Interpreting data
AQA GCSE Physical Education > 4. Use of data > 4.4 Analysis and evaluation of data
43 cards
4.1.6 Data Collection
OCR A-Level Geography > 4. Investigative Geography > 4.1 Independent Investigation
72 cards