Protecting Data Techniques

    Cards (21)

    • File permissions

      Protect IT systems from threats like hacking and accidental damage
    • File permissions

      • Read only
      • Read/Write
      • Full Control
    • Read only files

      Can be opened and viewed, but not edited
    • Read/Write files

      Can be opened, viewed and edited
    • Full Control files

      Can be opened, viewed, edited, modified and deleted
    • Access Levels

      Define which software, data and services users can access
    • Administrator access

      • Users can access all folders, alter permissions and install/delete software
    • Lowest level access

      • Users can only access a limited number files and software needed to do their job
    • Backup
      Taking a copy of data and storing it in a secondary location
    • Backup procedures

      • Full Backup
      • Incremental Backup
      • Differential Backup
    • Full Backup

      Complete backup of data, provides excellent protection but is time-consuming and requires large storage
    • Incremental Backup

      Backup of data that has changed since the previous backup, requires less storage and is quicker
    • Differential Backup

      Mixture of Incremental and full backup, usually used by businesses
    • Physical access controls

      • Access Cards
      • Keypad Access Control
      • Biometric Access Control
    • Access Cards

      Cards that must be scanned to unlock rooms, can be encoded and used for identification
    • Keypad Access Control

      Requires a passcode to gain entry, can be used with or instead of access cards
    • Biometric Access Control
      Scans biometric data to gain access (e.g. fingerprint, iris or facial recognition)
    • Electronic Locks
      Unlock/lock doors electronically when sent signals from any access control system
    • Digital Certificates

      Used to authenticate a user as the owner of a public key, allowing use of the public key infrastructure (PKI)
    • Protocols
      Set of rules that defines a method for transmitting data between different devices over a network
    • Transport Layer Security (TLS) and Secure Sockets Layers (SSL)

      Provide a secure connection between two computing devices so data can be transmitted in a secure encrypted format over the internet
    See similar decks