Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protecting Data Techniques - Coggle Diagram
Protecting Data Techniques
Files permissions
Files and folder stored on your computer can be set files permissions that vary from user to user i.e. who can access a file and what they can do with them
Stops people from affecting files either with malicious intent or accidental damage
Read/write - opened, viewed, edited
Read only - opened, viewed, not edited
Full control - opened, viewed, edited, modified, deleted
Access levels
Expand beyond files, user assigned an access level with their user login and the level defines what software, data and services they can access
Highest level (administrator access) - a user can access all folders with full control, alter other permission and install and delete software
Lowest level - only access a limited number of files and software they need to do their job
Benefit is that it prevents malware from infecting the system
If user has enough access to install software, you don't need to worry about them installing programs that contain malware (generally)
Backup & recovery procedures
Biggest impact of threats is data loss, if data loss is massive, it may cause a business to fail
To prevent this, businesses should take constant backups of data, involving copying data and storing it into a secondary location
Normally, this secondary location is not in the same building. (known as a remote backup), data still there even if a natural disaster happens to original
Full Backup - Complete backup of all data. Excellent protection but time-consuming and requires huge amounts of data storage capacity to store the backups
Differential backup - Mixture of the other 2 methods. Business takes a full backup then takes backups of data that has changed since that last full backup. E.g. full backup at the start of a week then incremental each day
Incremental backup - Backup of only the data that has been changed since the previous backup. Quicker and requires less storage than full backup.
Passwords
Important to keep passwords private, not shared with others, not written down
Good passwords provide protection from hackers but choosing one too simple can lead to hackers cracking the password in seconds (should be at least 10 characters, uppercase, lower, numbers, symbols)
Also the best practice to not use the same password repeatedly for different systems. if one system is compromised, other is still secure
Many users manage this by using a password locker application to remember all of their different passwords
Physical access controls
Used to protect IT systems in ways other than software
Include things like
Keypad access control:
System that requires a passcode to gain entry to a room
Biometric access control:
System scans biometric data to gain access to a room.
Access cards:
cards must be scanned to unlock rooms. Can be encoded to work on only certain doors and identification for security guards
Electronic locks:
All methods above require electronic locks to be sued to lock and unlock doors electronically when signals are sent from the above access control systems
Designed to protect malicious users from gaining access to IT systems. helping prevent theft of equipment, someone loading malware onto a system and stopping ackers from gaining access to data from within the business' own building
Digital certificates
Also known as public key certificates, used to authenticate a user as the owner of a public key
Allows them to make use of public key infrastructure (PKI) that is used for secure encrypted communications over the internet
A business obtains a digital certificate from a certificate authority, HTTPS (encryption)
Several contents:
Digital signature: verifies sender identity
Public-key: what is used to encrypt data when sending it to the website (such as login details)
Protocols
Set of rules that defines a method for transmitting data between different devices over a network
Specific security protocols are used when transmitting data over a network. most common are
Secure Sockets Layer (SSL)
and
Transport Layer Security (TLS)
TLS is more modern and secure replacing SSL
These protocols provide a secure connection between two computing devices so that data can be transmitted in a secure encrypted forma over the internet
HTTPS in URL means SSL/TSL is being used
Alongside digital certificates, it ensures our data, if intercepted by a malicious user, cannot be read and misused