Access Rights and Permission
- Created by: rsimpson02
- Created on: 30-04-17 18:58
View mindmap
- Access Rights and Permission
- Security Measures
- Data must be kept safe and secure when being stored or transmitted by computing devices
- Data can be kept safe from loss or accidental damage by careful use of the computing device
- Users can keep their data safe by:
- Saving their work regularly
- Making regular backups and never saving only one copy of their work
- Shutting down the computer properly
- Storing storage media such as CDs and other removable media carefully to avoid loss or damage
- All files and folders have access rights and permission that can be adjusted to control who can read, edit, alter or save the file
- Organisations have them so that they can monitor there employees and make sure that they don't access anything that they shouldn't
- They can be password protected so that only authorised staff can access the files
- Physical Security
- Organisations can use security guards to protect physical goods
- Security Badges
- Badges with RFID badges can be used to control where staff are allowed to go
- Other physical security includes not placing computer systems on the ground floor where they can be easily stolen
- Encryption
- Data could be copied or stolen but if the data is encrypted then it can't be read
- Data can be scrambled using data encryption software
- Data encryption software uses an encryption code or key to encrypt the contents of the data fie
- Digital signatures are used to check that a website message is authentic
- Security Measures
Comments
No comments have yet been made