Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Backup & Recovery

Passwords

Taking a copy of the data and storing it in a secondary location.

Three types of backup process include:

  • Full Backup
  • Incremental Backup
  • Differential Backup

Doesn't prevent threats but allows us to recover from any threat causing data loss.

Prevents unauthorised users from gaining access to systems.

Good passwords should be:

  • At least 10 characters in length
  • Containing uppercase letters, lowercase letters, numbers & symbols.

Particularly important in protecting against hackers.

Access Levels

This defines what software, data and services a user can access.

Highest level access is administrator access who can do anything.

Lowest level might be only able to use certain software & access certain files.

This is particularly helpful in preventing malware.

Physical Access Controls

KnowItAllNinja.com

Protect our physical IT systems from harm.

Example controls include:

  • Access Cards
  • Keypad Access Control
  • Biometric Access Control
  • Electronic Locks

Helps prevent theft of equipment, malware being loaded onto a system & hackers.

Protecting Data Techniques

http://www.knowitallninja.com

File Permissions

This sets who can access what files and what they can do with them.

Three main types:

  • Read-Only
  • Read/Write
  • Full Control

Protects against all threats, particularly accidental damage and hacking.

Digital Certificates

Used to authenticate a user as the owner of a public key to allow them to use public key encryption.

Key data in a digital certificate include:

  • Digital Signature
  • Public Key

Helps to prevent hackers gaining access to data during transmission.

Protocols

When transmitting data over a network there are specific security protocols.

These are:

  • SSL
  • TLS

This is used along with digital certificates to allow us to protect our data from being access during transmission.

Learn more about creating dynamic, engaging presentations with Prezi