Please enable JavaScript.
Coggle requires JavaScript to display documents.
Types of Protection measures - Coggle Diagram
Types of Protection measures
Physical Protection measures
Locks, keypads and biometrics
These are features like touch or face ID, retinal scans to prevent access to workplaces and server rooms for example
Placing computers above known flood levels
This involves putting servers and computers above flood levels in the area so that if something does occur, then the computer and servers will survive and still be able to run like normal.
Backup Systems in other locations
Linking to the previous one, by backing-up data and information in other areas, data can still be used and services will still operate like normal without the stress of all information being located in one place. Copies will still be available.
Security Staff
Hiring security staff to protect data is good for guarding it at large data centres, keeps out any people that are trying to break in. Expensive though.
Shredding Paper
This is the physical destroying of paper records that businesses don't need anymore and need to get rid of. People may try and put the pieces back together however which is why burning it may be a better solution.
Logical Protection Measures
Tiered Levels of Access
Providing access to certain and trusted people to specific data sets, means that only trusted people can deal and manage data
Firewalls
These can stop dodgy data and information coming in to a network, protecting attacks to the business and keeping them out.
Anti-Malware applications
Encryption
This is the scrambling of data so that not even a computer can read or decipher it. Only the people with the keys can access the data. The two types of encryption are at rest and while in transport
Obfuscation
Obfuscation is similar to encryption, however the computer can read the deliberately scrambled data, to stop other programmers from using it for example.
Usernames and Passwords
Usernames and Passwords are used to match with each other as a secure way to stop people from accessing certain data. It prevents passwords from being to easy to guess by hackers and computers.