Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protecting Data Techniques (File Permissions (File permission mean that…
Protecting Data Techniques
File Permissions
File permission mean that you can set who can access files and what they can do with them. There are three main file permission types: read-only, read/write and full control.
Read Only – files can be opened and viewed, but not edited.
Read/Write – files can be opened, viewed and edited.
Full Control – files can be opened, viewed, edited, modified & deleted.
This protects our IT systems from all threats, but particularly hacking and accidental damage. If a user only has read only access, they cannot edit, modify or delete data, either maliciously or by accident.
Access Levels
Access levels control what software, data and services a user can access. The highest level is administrator access.
Access levels are closely linked to file permission, but expand beyond just files
Users are assigned an access level that is associated with their user profile login
At the lowest end a user can only access a limited number of files and the software they need to do their job.
A key benefit of this to security is in preventing malware from infecting the system.
Backup & Recovery Procedures
Backups involve taking a copy of the data and storing it in a secondary location. This is normally in a different building, called a remote backup. There are three main types of backup: full, incremental & differential.
Full Backup – This is a complete backup of all your data. This provides excellent protection but is time consuming and requires huge amounts of data storage capacity to store the backups.
Incremental Backup – This is a backup of only the data that has changed since the previous backup. This is obviously much quicker and requires less storage space that a full backup.
Differential Backup – A mixture of the previous two. A business takes a full backup and then takes backups of data that has changed since that last full backup. So you might do a full backup at the start of each week and then incremental backups each day of the week.
Passwords
Everyone uses passwords to prevent unauthorised users from gaining access to their systems, software and user profiles. It is important that we keep our password private and do not share it with others or write it down as this can easily lead to it being compromised.
Having a good password is particularly important for protecting from hackers. However, choosing a simple password is little protection as a hacker can crack simple passwords in seconds.
At least 10 characters in length.
Containing uppercase letters, lowercase letters, numbers & symbols.
Physical Access Controls
Physical access controls prevent unauthorised users from gaining access to our IT systems. Examples of physical access controls include: access cards, keypad access control, biometric access control & electronic locks.
Access Cards – Cards that must be scanned to unlock rooms. They can be encoded to work on only certain doors and can also be used as identification from security guards (if they contain id information such as a name and photo).
Keypad Access Control – A system that requires a passcode to gain entry to a room. It can be used in place of, or alongside access cards.
Biometric Access Control – A system that scans biometric data to gain access to a room. This might be, for example, finger print, iris or facial recognition. Again, this can be used alongside the other above methods to gain access.
Digital Certificates
Digital certificates are used to authenticate a user as the owner of a public key so they can use public key encryption. Two key parts of a digital certificate are the signature and the public key.
Also known as a public key certificate, this is used to authenticate a user as the owner of a public key. This allows them to make use of the public key infrastructure (PKI) that is used for secure encrypted communications over the internet.
A business obtains a digital certificate from a certificate authority. You’ve almost certainly used a website where the URL has HTTPS:// as opposed to HTTP:// (there may also be a padlock symbol by the URL too). You probably even know the extra S means “secure” and it means the website is encrypting the data being transmitted between you and it.
Protocols
Protocols are a set of rules that defines a method for transmitting data between different devices over a network. Security protocols that are used include SSL and TLS. These allow us to send data securely over the internet using encryption.
As we saw in an earlier lesson, a protocol is a set of rules that defines a method for transmitting data between different devices over a network.