Policies and security methods for internet access

?
Q1 What is single factor authentication?
Single-factor authentication (SFA) is where the user can obtain access to an account or service using one factor such as a password.
1 of 17
Q2 What is the risk with using single factor authentication?
If the same password is used for multiple applications they are all vunerable if the password gets hacked. Using a unique password for each application will minimise this risk.
2 of 17
Q3 What is two factor authentication?
Two factor authentication is a security method by which users obtain access by providing two separate factors to identify themselves.
3 of 17
Q4 What are the three different types of factors that can be used for authentication?
•Knowledge factor- knowing a password or PIN •Possesion factor- owning a membership card or mobile phone. •Biometric factor- a human characteristic such as a fingerprint, DNA or voice print.
4 of 17
Q5 Bank card reader example
Customer needs: •PIN number (knowledge) •Debit card (possesion) to log into their account. Customer places card in reader and enters PIN. The passcode displayed on the card reader is entered into a web log in page to allow the customer account acess.
5 of 17
Q6 Mobile transaction numbers (mTANs) example. What does member need?
Member needs: •Password (knowledge) •Mobile phone (possesion) to log in to their account.
6 of 17
Q7 Mobile transaction numbers (mTANs) example. What are the steps?
1. Member enters username and password into Progress Leisure login page. 2. Progress Leisure recieves the login request from the member and texts a security code to the member's mobile phone. 3. Member enters the security code to log to the website.
7 of 17
Q8 Why would this method of two-factor authentication be suitable for Progress Leisure?
Because the member simply needs: •Their laptop/tablet and their mobile phone, or •They can directly log in to their smartphone.
8 of 17
Q9 What are the benefits of two factor authentication?
1. Greater security than single-factor authentication, which just uses password protection 2. Deterrent as hackers are more likely to avoid a two-factor authenticated account.
9 of 17
Q10 What are the limitations of two factor authentication?
1. Phone or card and reader needed to log on to application 2. Customers dislike having to take more time to add in the extra layer of security.
10 of 17
Q11 What things should be taken into account when creating passwords? (further security method)
•Use strong passwords with a mixture of numbers, letters, symbols and lower/upper case •Change passwords regularly
11 of 17
Q12 How do access rights help as a further security method?
Set up by system administrator to limit network access to relevant files only for a user.
12 of 17
Q13 How does encryption help as a further security method?
Used to make stored data more secure, by making it unreadable to people who do not have the key to decode it.
13 of 17
Q14 How does a firewall help prevent hacking?
1. Checks the integrity of incoming messages and requests for service from the system. 2. Suspicious messages or requests can be rerouted temporarily until the legitamacy has been established.
14 of 17
Q15 How does an Intrusion Detection System (IDS) help prevent hacking?
1. Designed to monitor the network or computer system for malicious activities. 2. If an incident is detected, a report sent to network management. 3. Futher action taken if necessary to prevent any risks to the system.
15 of 17
Q16 How does antivirus software help protect against viruses?
1. Searches the computer system for viruses and deletes them once detected. 2. Treat files and attached email files from unkown sources with caution to avoid viruses getting into the system.
16 of 17
Q17 How does anti-spyware software help protect against spyware?
1. Prevents and detects spyware from being installed. 2. Removes spyware that has previously been installed.
17 of 17

Other cards in this set

Card 2

Front

Q2 What is the risk with using single factor authentication?

Back

If the same password is used for multiple applications they are all vunerable if the password gets hacked. Using a unique password for each application will minimise this risk.

Card 3

Front

Q3 What is two factor authentication?

Back

Preview of the front of card 3

Card 4

Front

Q4 What are the three different types of factors that can be used for authentication?

Back

Preview of the front of card 4

Card 5

Front

Q5 Bank card reader example

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »