Data Level Protection Summary

Data Level Protection

  • Techniques to protect data against unauthorized access.
  • Essential for companies holding data.
Common Methods
  • Firewalls: Monitor and control incoming/outgoing traffic.
  • Anti-virus Software: Scans for and removes malware.
  • Interface Design: Enhancements that improve security while interacting with data.

Firewalls

  • Function: Block suspicious traffic based on security rules.
  • Types:
    • Hardware Firewalls: Physical devices installed between LAN and the Internet, protecting against external threats.
    • Software Firewalls: Programs installed on each computer to filter traffic.
Pros & Cons
  • Pros:
    • Prevents unauthorized access from external attackers.
    • Cost-effective for software firewalls.
  • Cons:
    • Can restrict legitimate user activities.
    • Resource-intensive, possibly slowing performance.

Anti-Virus Software

  • Function: Scans for and removes malware; offers on-demand and real-time protection.
  • Detection Methods:
    • Signature Detection: Matches unique patterns to identify malware.
    • Heuristic Detection: Monitors behavior of processes to detect malware.
Pros & Cons
  • Pros:
    • Comprehensive malware protection.
    • Affordable and easy to set up.
  • Cons:
    • Requires regular updates.
    • Resource-intensive during scans.

Interface Design

  • Improves security through various features:
    • Obscuring Data Entry: Prevents shoulder surfing by masking typed data.
    • Autocomplete: Reduces typing, minimizing keylogging risks.
    • “Stay Logged In”: Keeps users logged in to protect against spyware.
Pros & Cons
  • Pros:
    • Reduces need for stringent security measures.
  • Cons:
    • May affect usability and accessibility.
Threats Addressed by Design
  • Obscuring Data Entry: Protects against shoulder surfing.
  • Autocomplete: Prevents spyware from logging keystrokes.
  • “Stay Logged In”: Also helps in protecting against spyware.