Cyber Security

?
  • Created by: Celeste
  • Created on: 21-10-20 10:57
PROTECTION
Firewalls,
Anti-Malware,
Auto-Updates,
User Permissions,
1 of 5
FIREWALLS
A firewall checks incoming and outgoing network traffic.
It scans the data to make sure it doesn’t contain anything malicious and that it follows the rules set by the network.
2 of 5
ANTI-MALWARE
Anti-malware is software that scans any file that is able to execute code.
The anti-malware will have a list of definitions of sequences of code that they are aware are malicious.
If the code in your files matches the definitions, the files are quarantine
3 of 5
AUTO-UPDATES
Auto-updates refers to software that automatically checks for available updates for the software you have on your computer.
Once it finds an update, the software can be set either to alert the user or to install it automatically.
This software is often in
4 of 5
USER PERMISSIONS
Users on a network can be put into groups who can do stuff such as:
Which network drives they have access to
Their read/write permissions
Which printers they are able to use
What software they can use
Which websites they are allowed to access.
5 of 5

Other cards in this set

Card 2

Front

A firewall checks incoming and outgoing network traffic.
It scans the data to make sure it doesn’t contain anything malicious and that it follows the rules set by the network.

Back

FIREWALLS

Card 3

Front

Anti-malware is software that scans any file that is able to execute code.
The anti-malware will have a list of definitions of sequences of code that they are aware are malicious.
If the code in your files matches the definitions, the files are quarantine

Back

Preview of the back of card 3

Card 4

Front

Auto-updates refers to software that automatically checks for available updates for the software you have on your computer.
Once it finds an update, the software can be set either to alert the user or to install it automatically.
This software is often in

Back

Preview of the back of card 4

Card 5

Front

Users on a network can be put into groups who can do stuff such as:
Which network drives they have access to
Their read/write permissions
Which printers they are able to use
What software they can use
Which websites they are allowed to access.

Back

Preview of the back of card 5

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all computing resources »