Please enable JavaScript.
Coggle requires JavaScript to display documents.
Authentication and Protection against Threats (Protection against Threats…
Authentication and Protection against Threats
Authentication
Email Confirmation
Used by most web services that require account registration to confirm that the email address belongs to the person registering
Stops people from using fake emails to sign up to things
CAPTCHA
Stands for completely automated public Turing test to tell computers and humans apart
Designed to prevent programs from automatically doing certain things like creating user accounts on a website
Consists of simple task like typing out a blurred and distorted word from an image
Biometric Measures
Use scanners to identify people by a unique part of their body
Many different uses such as fingerprint scanners
Passwords
Are a simple method of checking someone's identity
Weak or default passwords are a big security risk. They should use a combination of letters, numbers and symbols and often changed
User authentication exists to make sure that anyone trying to access a network or use a system is who they say they are. This prevents unauthorized people from accessing data from the network
Protection against Threats (Networks)
Automatic Software Updates
Used to path any identified security holes in a piece of software
Software that is unpatched or outdated could be more easily exploited by hackers, malware and viruses
User Access Levels
Controls which parts of the network different groups of users can access
User access levels limit the number of people with access to important data and help prevent attacks from within an organisation
Anti-malware Software
For example firewalls. They examine all data leaving and entering a network and scan for potential threats
Designed to find and stop malware from damaging an organisations network and the devices on it
MAC Address Filtering
Is a way of making sure only people on a network are trusted users
Checks unique identification (MAC address) of each device that tries to connect and only lets allowed devices to connect
Encryption
Encrypted text = Cipher text, Not Encrypted data = plain test
Is when data is translated into a code which only someone with the correct key can access
Encryption is essential for sending data over a network securely
Organisations must keep their networks secure from hackers in order to protect sensitive information and comply with data protection laws