Data Level Protection Summary
Data Level Protection
- Techniques to protect data against unauthorized access.
- Essential for companies holding data.
Common Methods
- Firewalls: Monitor and control incoming/outgoing traffic.
- Anti-virus Software: Scans for and removes malware.
- Interface Design: Enhancements that improve security while interacting with data.
Firewalls
- Function: Block suspicious traffic based on security rules.
- Types:
- Hardware Firewalls: Physical devices installed between LAN and the Internet, protecting against external threats.
- Software Firewalls: Programs installed on each computer to filter traffic.
Pros & Cons
- Pros:
- Prevents unauthorized access from external attackers.
- Cost-effective for software firewalls.
- Cons:
- Can restrict legitimate user activities.
- Resource-intensive, possibly slowing performance.
Anti-Virus Software
- Function: Scans for and removes malware; offers on-demand and real-time protection.
- Detection Methods:
- Signature Detection: Matches unique patterns to identify malware.
- Heuristic Detection: Monitors behavior of processes to detect malware.
Pros & Cons
- Pros:
- Comprehensive malware protection.
- Affordable and easy to set up.
- Cons:
- Requires regular updates.
- Resource-intensive during scans.
Interface Design
- Improves security through various features:
- Obscuring Data Entry: Prevents shoulder surfing by masking typed data.
- Autocomplete: Reduces typing, minimizing keylogging risks.
- “Stay Logged In”: Keeps users logged in to protect against spyware.
Pros & Cons
- Pros:
- Reduces need for stringent security measures.
- Cons:
- May affect usability and accessibility.
Threats Addressed by Design
- Obscuring Data Entry: Protects against shoulder surfing.
- Autocomplete: Prevents spyware from logging keystrokes.
- “Stay Logged In”: Also helps in protecting against spyware.