110 likes | 239 Views
Data security. Level 2 Diploma Unit 11 IT Security. Physical protection. Limiting visibility of monitors Not overlooked Restricted vision screens Blackout Privacy Filter prevents unauthorized viewing Micro-louvre technology creates a narrow viewing angle
E N D
Data security Level 2 Diploma Unit 11 IT Security
Physical protection • Limiting visibility of monitors • Not overlooked • Restricted vision screens • Blackout Privacy Filter prevents unauthorized viewing • Micro-louvre technology creates a narrow viewing angle • Image is only visible to those directly in front of the screen • Side view is black
Encryption • “Scrambles” data on the disk so that it cannot be read without knowing the key • Can be set in folder properties • Uses the account details as a key • Need to export keys and save elsewhere • In case account is deleted or invalid • In case you want to use different computers
Encryption • This is one of the simplest forms of encryption: • Aycqypsqcbrfgqambc. • This is more sophisticated and demands that you have a key to decrypt it: Dyghvcnvrdhy 200 nxobjhdufori Of course you can make it even harder: Dyghvcnvrdhy 200 nxobjhdufori
Encryption • Even if you have this table you still can’t decode without the key!
When would you encrypt? • to protect information from unauthorised view • credit card numbers • bank account information • personal health, income, tax, benefits information • personal correspondence • commercially sensitive information
Recovering encrypted data • In Windows you must create a recovery certificate for encrypted files • A recovery certificate is a special Encrypting File System (EFS) certificate • Requires administrator permissions • Enables you to recover encrypted files if your encryption key is lost or damaged
Software protection • Anti virus • Spyware protection • In teams of 2 • research 5 examples of software that protects against virus and spyware • Compare their features and cost • Arrange them in order of your choice of the most effective • Present your results
Password protection of files • Available on Office files
Digital signatures • A digital signature validates the authenticity of a digital message or document. • Checks the message • was created by a known sender, • it was not altered in transit. • Mainly used for software distribution and financial transactions,