Level 2 Diploma Unit 11 IT Security Data security Level 2 Diploma Unit 11 IT Security
Physical protection Limiting visibility of monitors Not overlooked Restricted vision screens Blackout Privacy Filter prevents unauthorized viewing Micro-louvre technology creates a narrow viewing angle Image is only visible to those directly in front of the screen Side view is black
Encryption “Scrambles” data on the disk so that it cannot be read without knowing the key Can be set in folder properties Uses the account details as a key Need to export keys and save elsewhere In case account is deleted or invalid In case you want to use different computers
Encryption This is one of the simplest forms of encryption: Aycqyp sqcb rfgq ambc. This is more sophisticated and demands that you have a key to decrypt it: Dygh vcnv rdhy 200 nxobj hd ufori Of course you can make it even harder: Dyg hvc nvr dhy 200 nxo bjh duf ori a b c d e f g h i j k l m n o p q r s t u v w x y z Plain text Code
Encryption Even if you have this table you still can’t decode without the key!
When would you encrypt? to protect information from unauthorised view credit card numbers bank account information personal health, income, tax, benefits information personal correspondence commercially sensitive information
Recovering encrypted data In Windows you must create a recovery certificate for encrypted files A recovery certificate is a special Encrypting File System (EFS) certificate Requires administrator permissions Enables you to recover encrypted files if your encryption key is lost or damaged
Folder properties
Software protection Anti virus Spyware protection In teams of 2 research 5 examples of software that protects against virus and spyware Compare their features and cost Arrange them in order of your choice of the most effective Present your results
Password protection of files Available on Office files
Digital signatures A digital signature validates the authenticity of a digital message or document. Checks the message was created by a known sender, it was not altered in transit. Mainly used for software distribution and financial transactions,