Protection Measures - Logical

Access levels

Grant different permissions to certain users

Three levels: no access, read only, read/write

Ensures that only authorised people can access and change certain files/data

Firewalls

Filter data packets and block anything identified as harmful

Block access to specific websites and programs

Can be a physical device or software installed on the computers.

Antimalware

Scans a system and removes any malicious software

Should be regularly updated

Encryption

Encryption at rest

Encryption in transit

Converting data into ciphertext so it cannot be read without a key

Encrypting data when it is being stored

Encrypting data when it is being transferred to prevent interception attacks

Obfuscation

Data is deliberately changed to be unreadable to humans but readable by computers

Program code can be obfuscated to make modification more difficult

Software can be used to obfuscate and deobfuscate data