Please enable JavaScript.
Coggle requires JavaScript to display documents.
The Role of Hardware and Software in Networked Digital Systems (Securing…
The Role of Hardware and Software in Networked Digital Systems
Movement of Data
Transferring Cables
Drive
#
SSD
HDD
Floppy Drive
Flash Drive
Optical Drive
Web Transfers
Emailing
FTP
P2P
Cloud Storage
Other
Faxing
Management of Data
Data Design
Binary Format
Text Format
Data Storage
#
#
Hard Drive
Flash Memory
BIOS Settings
Digital Cameras
Handphones
Optical Media
CD/DVD
USB
Hard Drives
RAM
Data Security
#
Securing of Data
#
Control of Data
Restricting access
User authentication
Ownership
- user has
Security token
Software token:
Google Authenticator (Time-based OTP)
Hardware token:
ID Card
Knowledge
- user knows
Passwords
PINs
Challenge response:
CAPTCHAs
Security questions
Biometric/inherence
- user is/does
Fingerprint:
Touch ID
Voice:
ANZ Voice ID
Face:
Face ID (iPhone X)
Eyes:
Samsung Iris Recognition
Multiple-factor authentication
#
Using more than one-factor of authentication (not just a password)
Storing data securely
Backing up files
Internal
Restore points
External
Local
Windows File History / Backup and Restore
macOS Time Machine
Cloud-based
#
Google Drive Backup & Sync
OneDrive
Dropbox
Encrypting files
Offline
Data is encrypted using a key
Key:
Often the same as the Password or PIN to access the device
#
Online
HTTPS
(Hypertext Transfer Protocol Secure)
#
Key:
Either both parties have same key to encrypt & decrypt or encryption key is public for anyone to use (but decryption key isn't)
Protecting data from viruses, worms, Trojans & bots
Antivirus software
User-awareness
Stay Smart Online
Physical protection
Keeping data storage area secure
Control access to computer areas
Keeping backups in a safe place
Free of weather issues, water, etc.
Online Data Security
Example:
Websites use HTTPS to secure data in transit between the user's computer and its own computer/server. This means data sent between the two is encrypted and cannot be intercepted and deciphered. The data can only be decrypted into readable data by using a key.
Access to Data
#
#
Sequential Access (SAM)
Tape drive
Random Access (RAM)
Computing devices
SMS OTPs:
Combine software and hardware methods
#
#