110 likes | 247 Vues
This unit covers essential aspects of IT security focusing on physical protection and data encryption. Key strategies include limiting monitor visibility using blackout privacy filters and micro-louvre technology, which ensures that information is only viewable from a direct angle. It explores encryption methods to safeguard sensitive data such as credit card numbers and personal information, including the importance of recovery certificates for encrypted files. Additionally, it discusses software protection against viruses and spyware, as well as the significance of digital signatures for verifying authenticity.
E N D
Data security Level 2 Diploma Unit 11 IT Security
Physical protection • Limiting visibility of monitors • Not overlooked • Restricted vision screens • Blackout Privacy Filter prevents unauthorized viewing • Micro-louvre technology creates a narrow viewing angle • Image is only visible to those directly in front of the screen • Side view is black
Encryption • “Scrambles” data on the disk so that it cannot be read without knowing the key • Can be set in folder properties • Uses the account details as a key • Need to export keys and save elsewhere • In case account is deleted or invalid • In case you want to use different computers
Encryption • This is one of the simplest forms of encryption: • Aycqypsqcbrfgqambc. • This is more sophisticated and demands that you have a key to decrypt it: Dyghvcnvrdhy 200 nxobjhdufori Of course you can make it even harder: Dyghvcnvrdhy 200 nxobjhdufori
Encryption • Even if you have this table you still can’t decode without the key!
When would you encrypt? • to protect information from unauthorised view • credit card numbers • bank account information • personal health, income, tax, benefits information • personal correspondence • commercially sensitive information
Recovering encrypted data • In Windows you must create a recovery certificate for encrypted files • A recovery certificate is a special Encrypting File System (EFS) certificate • Requires administrator permissions • Enables you to recover encrypted files if your encryption key is lost or damaged
Software protection • Anti virus • Spyware protection • In teams of 2 • research 5 examples of software that protects against virus and spyware • Compare their features and cost • Arrange them in order of your choice of the most effective • Present your results
Password protection of files • Available on Office files
Digital signatures • A digital signature validates the authenticity of a digital message or document. • Checks the message • was created by a known sender, • it was not altered in transit. • Mainly used for software distribution and financial transactions,