Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 3: Cyber Security LO 3.3 - The different methods that can be used to…
Unit 3: Cyber Security
LO 3.3 - The different methods that can be used to protect data on the phone
Encryption
Database
File
Password
What type of encryption will be used?
Two Factor Authentication
Mobile Device Management
(MDM)
Wipe Data if lost
Enforce device policies
Track device usage and location
Strong Password Policy
Privacy Screen Filter
Biometrics
Facial Recognition
Body Movements
Iris Scanner
Voice Recognition
Fingerprint Recognition
Operating System Updates
Lock away in safe
Access Management
Training
Remote Working
VPN for internal system access
User Accounts & Permissions
Firewall/Antivirus
Other physical methods
Patch management
Risk Analysis