Protection Measures - Logical
Access levels
Grant different permissions to certain users
Three levels: no access, read only, read/write
Ensures that only authorised people can access and change certain files/data
Firewalls
Filter data packets and block anything identified as harmful
Block access to specific websites and programs
Can be a physical device or software installed on the computers.
Antimalware
Scans a system and removes any malicious software
Should be regularly updated
Encryption
Encryption at rest
Encryption in transit
Converting data into ciphertext so it cannot be read without a key
Encrypting data when it is being stored
Encrypting data when it is being transferred to prevent interception attacks
Obfuscation
Data is deliberately changed to be unreadable to humans but readable by computers
Program code can be obfuscated to make modification more difficult
Software can be used to obfuscate and deobfuscate data