Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security ad Data Management - Coggle Diagram
Security ad Data Management
Network security - You can get unauthorised sources accessing this data when you send it online.
Password need to be secure and safe
Passwords add an additional layer of security when accessing a computer system.
Strong passwords may require the user to use a combination of upper and lower case letters, numbers and symbols such as @ ! ~ - / \ %.
Other users can guess short simple passwords, or a hacker may have access to programs that brute force attack - trying multiple guesses in quick succession until the correct password is found.
User access levels - you need the right people the right apps to access to do their job
You can compress data to make them smaller in size.
This allows more data to be stored on the disk.
Files may also be transferred more quickly.
Lossy compression reduces the file size by discarding data.
Lossless compression uses an algorithm to compresses data into a form that may be decompressed without any loss of data, returning the file to its exact original form.
Network policies
Network policies are documents outlining the rules that users are required to follow while using a computer network. Following its publication, network users will be expected to adhere to the rules.
Typical rules set out in these policies include:
a list of unacceptable types of website that should not be visited
activities that are not allowed on the network, such as gambling and installation of unauthorised software
Acceptable and unacceptable use of resource, such as printers
Disaster recovery
A disaster recovery policy outlines all the processes that must be carried out in the event of a disaster, such as data loss or a manmade error, to ensure that the business is able to perform normally within a short amount of time
CyberSecurity
Malware - short for malicious software, malware is a broad term used to describe software used to disrupt computer operation.
Worms spread from device to device, but unlike a virus they don’t need to attach themselves to other files (attack vectors) - worms can copy themselves hundreds of times, so they can very quickly harm your device and other devices. A worm might copy itself onto your email account and then send a copy to all of your email contacts, for example
Key loggers - covert programs that capture keyboard (or other input device) input and transmit this data to a third party or hold the data for collection. Onscreen keyboards or Bluetooth keyboards are a method of protection against keyloggers
Spyware. Installed by opening attachments or downloading infected software. Spyware can be used to collect stored data without the user’s knowledge.
Trojans. A Trojan is a program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen/damaged.
Each virus has a unique ‘signature’ that is known to virus protection software and stored in a database.
DoS attack - Denial of service (DoS) attacks attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests—usually in an attempt to exhaust server resources. A DoS attack will involve a single Internet connection. Distributed denial of service (DDoS) attacks are launched from multiple connected devices that are distributed across the Internet.
Blagging - when someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money. For example, a person may receive an email that appears to be from a friend telling them that they’re in trouble and asking them to send money.
Footprinting is the first method that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting is to learn as much as you can about a system, its remote access capabilities, its ports and services, and the aspects of its security
Scripting restrictions - Websites are vulnerable to cross-site scripting (XSS), which enables attackers to enter scripts into forms viewed by other users in an attempt to gain access to the system. A script from another site could access further sites, which might lead to malware intrusions.