Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Taking a copy of the data and storing it in a secondary location.
Three types of backup process include:
Doesn't prevent threats but allows us to recover from any threat causing data loss.
Prevents unauthorised users from gaining access to systems.
Good passwords should be:
Particularly important in protecting against hackers.
This defines what software, data and services a user can access.
Highest level access is administrator access who can do anything.
Lowest level might be only able to use certain software & access certain files.
This is particularly helpful in preventing malware.
Protect our physical IT systems from harm.
Example controls include:
Helps prevent theft of equipment, malware being loaded onto a system & hackers.
http://www.knowitallninja.com
This sets who can access what files and what they can do with them.
Three main types:
Protects against all threats, particularly accidental damage and hacking.
Used to authenticate a user as the owner of a public key to allow them to use public key encryption.
Key data in a digital certificate include:
Helps to prevent hackers gaining access to data during transmission.
When transmitting data over a network there are specific security protocols.
These are:
This is used along with digital certificates to allow us to protect our data from being access during transmission.