Protecting files from theft (being stolen)

Description

Mind Map on Protecting files from theft (being stolen), created by Giulietta Swift on 15/04/2015.
Giulietta Swift
Mind Map by Giulietta Swift, updated more than 1 year ago
Giulietta Swift
Created by Giulietta Swift over 9 years ago
7
0

Resource summary

Protecting files from theft (being stolen)
  1. Password protection
    1. Strong password
      1. Include numbers
        1. Include capitals
          1. Special charachters
            1. Don't use personal information
              1. Long enough (min 8 characters)
            2. Access rights and permissions
              1. Read (look at the data)
                1. Copy
                  1. Write (Edit the data)
                  2. Firewalls
                    1. Software or Hardware
                      1. Controls what data can pass through it
                      2. Physical protection
                        1. Locks on doors
                          1. Key
                            1. Keypad
                              1. Card
                                1. RFID (Radio Frequency Identification)
                                2. Biometrics (fingerprint & retina scanner)
                                3. Security guards
                                  1. Location of stored data - upstairs, away from entrance
                                    1. GPS tracking
                                    2. Encryption
                                      1. If data has been stolen encryption prevents the data being used.
                                        1. Data is encrypted (scrambled)
                                          1. Only if you have the 'key' can you decrypt the data.
                                            1. Encrypted data has no meaning.
                                            2. Backup data
                                              1. Make a copy of the data
                                                1. Should be stored away from the original data
                                                2. Name
                                                  Show full summary Hide full summary

                                                  Similar

                                                  General ICT Quiz
                                                  Jade Fantom
                                                  Study Plan
                                                  mlanders
                                                  GCSE French Edexcel High Frequency Verbs: First Set
                                                  alecmorley2013
                                                  Exchange surfaces and breathing
                                                  megan.radcliffe16
                                                  AQA Biology 8.1 structure of DNA
                                                  Charlotte Hewson
                                                  Edexcel Additional Science Biology Topic 2- Life Processes
                                                  hchen8nrd
                                                  History- Medicine through time key figures
                                                  gemma.bell
                                                  ICT GCSE flashcards
                                                  Catherine Archer
                                                  AP Psychology Practice Exam
                                                  Jacob Simmons
                                                  NSI Course
                                                  Yuvraj Sunar
                                                  CSA (115) ⊙ IITU 2017
                                                  Zhandos Ainabek