Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and data management - Coggle Diagram
Security and data management
network Security
risk to data become greater as it is shared across a network
Unauthorised access to a network can allow the hacker to see of the stored data
To secure a network also requires a good level of access (restricting people so they can only do the job there supposed to do)
User access levels
It is not sensible or safe for every network user to have access to all the data on a computer system
User access levels define which users can change and view, view but not change, or not view stored data
It will also specify what software they can or can’t access.
Compression and compression types
Compression is the process of making file smaller so it takes less disk/memory space.
Backup
A backup is a copy of data that can be used if the original data is lost.
A typical backup policy is called the grandfather-father-son method. The oldest backup copy would be named the grandfather, the second oldest backup being named the father and the most recent backup being called the son. When a new backup is made, the oldest backup, the grandfather is overwritten and becomes the son backup, with the original son becoming the father and the father becoming the grandfather.
Archiving
Data held on a computer is often archived
2 more items...
This allows more data to be stored on the disk
Files may also be transferred more quickly.
There are two primary methods that are used to compress files stored on a computer system; these are lossy and lossless.
Lossless
Lossless compression uses an algorithm to compresses data into a form that may be decompressed without any loss of data, returning the file to its exact original form.
A simple lossless compression on a word-processed document replaces common strings, such as ‘the’, with a token such as the symbol
,
making a 2 byte saving every time the word ‘the’ occurs.
Lossy compression
Lossy compression reduces the file size by discarding data.
The technique aims to reduce the amount of data that needs to be stored.
1 more item...
It is preferred to lossy compression when the loss of any detail, for example in a computer program or a word-processed document, could have a detrimental effect.
Trojans. A Trojan is a program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen/damaged. (like a virus)
Cookies
1 more item...
Encryption techniques
Encryption is using an algorithm to convert data into a form called cyphertext that cannot be easily understood by people without a decryption key.
When data is encrypted, the Xor logical operator is sometimes used.
When encrypting data, the XOR logical operation is performed on the original data and a key. The key is a secure binary number known only to the sender and recipient. When the XOR is complete, it creates cyphertext, which is what is sent to the recipient, for them to decrypt using XOR.
Network policies
Network policies are documents outlining the rules that users are required to follow while using a computer network. Following its publication, network users will be expected to adhere to the rules.
Disaster recovery
A disaster recovery policy outlines all the processes that must be carried out in the event of a disaster, such as data loss or a manmade error, to ensure that the business is able to perform normally within a short amount of time
5 more items...
CyberSecurity
Cybersecurity refers to the range of measures that can be taken to protect computer systems, networks and data from unauthorised access or cyberattack.
Malware short for malicious software is a broad term used to disrupt computer operation
The XOR logical operator has two inputs and one output. The output is 1 if either A or B are 1, but not both of them at the same time
SQL Injection
SQL is a programming language for interrogating data, and SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve.
Blagging
when someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money. For example, a person may receive an email that appears to be from a friend telling them that they’re in trouble and asking them to send money.
Suitable passwords
Passwords add an additional layer of security when accessing a computer system.
Strong passwords may require the user to use a combination of upper and lower case letters, numbers and symbols such as @ ! ~ - / \ %.
Strong passwords are much harder to guess and will take longer to brute force