1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Anti malware
scans for malware
Compares data to a database of malware
Alerts user and requests actions such as deleting/stopping download of malware
Firewall
scans incoming and outgoing data
Compares traffic to criteria
blocks unauthorised data
Blocks incoming/outgoing traffic
encryption
scrambles data using an algorithm so if intercepted it cant be understood
Needs a key to decrypt
User access levels
Data can be read/write by example
Prevents accidental changes
Limits data users can access
Anti spyware
scans for malware
Compares data to database of spyware
Deletes spyware
Stops download of spyware
Passwords/biometrics/authentication
has to be correctly entered to gain access
Strong password with letters/numbers/symbols makes it harder for a brute force attack to succeed
Fingerprint is unique to individual
Lock after a certain number of failed attempts
Two step authentication
a code is sent to a user’s separate device
Unauthorised person will need access to this device as well