Outcome D-Protecting Data

?
  • Created by: Kazleesi
  • Created on: 12-11-21 11:05

Outcome D T6 Access control backup 1

Keeping Data Secure

Encryption, VPN, 2 Factor Authentication. Password Manager, Wipe Data/Overwrite

Technologies used in physical access control:

Automatic barriers and turnstiles, Electronic locks on doors, Security Camerasm RFID Cards,

Biometric Readers, Keypads, Security Guards

Toll Roads 

Machines can take payment and automatically open the barr

Number plate recognition can be used to open the barriers to pre-paid customers

Payment cards

Contactless, Chip & PIN, Swipe and signature, Cardholder not present..

1 of 6

Outcome D T6 Access control backup 2

Authentication:

Something the user knows, such as a PIN or password.

Something the user has, such as a smart card or electronic key fob.

Something the user is. A Biometric such as facial features, retinal pattern, fingerprint.

If two different types of authentication are used it is known as two-factor authentication.

Biometrics

Initially, one or more scans of an authorised person’s chosen characteristic are performed 

Key features or patterns of the characteristic are stored in the computer system

Thereafter, when a person attempts to gain entry to a room or device, the scan is compared with the features stored on the system.

2 of 6

Outcome D T6 Access control backup 3

Biometrics Advantages

 Difficult to hack and very secure, Convenient as you dont leave hands/eyes at home, Timesaving

Biometrics Disadvantages

Errors sometimes occur and the biometric device does not recognise the individual

Clothing, glasses or light levels can affect recognition

Biometric devices cost more than traditional security devices

An alternative system needed in case the software and hardware have trouble identifying an individual.

3 of 6

Outcome D T6 Access control backup 4

File permissions

Read, Write/modify/delete, Execute/run

3 2 1 Rule

Regarded as industry best practice. It states that you shouldm have 3 copies of your 

data at all times, backed up on at least two different types of storage ,with at least one 

copy offsite.

Storage Media

Magnetic disks, Hard disks, Magnetic tape, Optical disks, Cloud Storage

4 of 6

Outcome D T6 Access control backup 5

Backups

Full backup – this type of backup will make a copy of all files on a computer. May need to back up 100s of GBs of data so is very slow

Incremental backup – a full backup is made first then each subsequent one just copies any new data. It's very fast as the changes to data are normally very small.

Cloud backup sends a copy of the data via the Internet to a server hosted by a 3rd party service provider. Dropbox, OneDrive and Google Drive all provide cloud storage.

Many other commercial backup and restore services are available from different companies

Cloud service companies have robust procedures for making sure that the data they hold is fully backed up at different sites, and well protected against cyber attack

5 of 6

Outcome D T6 Access control backup 6

Disaster Recovery

Procedures to be followed in the event of a disaster. Disaster could be environmental, accidental or man-made. It could be intentional such as arson or accidental such as fire, flood or lightning.The plan’s major objective is to minimise disruption and data loss.How backups are tested and recovered, Alternative premises that can be used. Paper systems that can be used whilst computer systems aren’t working.

Benefits of disaster recovery plans:

Minimises the risk of delays to restore systems. Guarantees the reliability of standby systems Provides a standard for testing the plan. Minimises decision-making during a disasterReduces potential legal liabilities. Lowers stress in a potentially very stressful situationMinimises the risk of delays to restore systems. Guarantees the reliability of standby systems. Provides a standard for testing the plan.. Minimises decision-making during a disaster. Reduces potential legal liabilities.. Lowers stress in a potentially very stressful situation.

6 of 6

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all T6 Access control backup resources »