1 / 11

Data security

Data security. Level 2 Diploma Unit 11 IT Security. Physical protection. Limiting visibility of monitors Not overlooked Restricted vision screens Blackout Privacy Filter prevents unauthorized viewing Micro-louvre technology creates a narrow viewing angle

vienna
Télécharger la présentation

Data security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data security Level 2 Diploma Unit 11 IT Security

  2. Physical protection • Limiting visibility of monitors • Not overlooked • Restricted vision screens • Blackout Privacy Filter prevents unauthorized viewing • Micro-louvre technology creates a narrow viewing angle • Image is only visible to those directly in front of the screen • Side view is black

  3. Encryption • “Scrambles” data on the disk so that it cannot be read without knowing the key • Can be set in folder properties • Uses the account details as a key • Need to export keys and save elsewhere • In case account is deleted or invalid • In case you want to use different computers

  4. Encryption • This is one of the simplest forms of encryption: • Aycqypsqcbrfgqambc. • This is more sophisticated and demands that you have a key to decrypt it: Dyghvcnvrdhy 200 nxobjhdufori Of course you can make it even harder: Dyghvcnvrdhy 200 nxobjhdufori

  5. Encryption • Even if you have this table you still can’t decode without the key!

  6. When would you encrypt? • to protect information from unauthorised view • credit card numbers • bank account information • personal health, income, tax, benefits information • personal correspondence • commercially sensitive information

  7. Recovering encrypted data • In Windows you must create a recovery certificate for encrypted files • A recovery certificate is a special Encrypting File System (EFS) certificate • Requires administrator permissions • Enables you to recover encrypted files if your encryption key is lost or damaged

  8. Folder properties

  9. Software protection • Anti virus • Spyware protection • In teams of 2 • research 5 examples of software that protects against virus and spyware • Compare their features and cost • Arrange them in order of your choice of the most effective • Present your results

  10. Password protection of files • Available on Office files

  11. Digital signatures • A digital signature validates the authenticity of a digital message or document. • Checks the message • was created by a known sender, • it was not altered in transit. • Mainly used for software distribution and financial transactions,

More Related