Download presentation
Presentation is loading. Please wait.
1
Level 2 Diploma Unit 11 IT Security
Data security Level 2 Diploma Unit 11 IT Security
2
Physical protection Limiting visibility of monitors Not overlooked
Restricted vision screens Blackout Privacy Filter prevents unauthorized viewing Micro-louvre technology creates a narrow viewing angle Image is only visible to those directly in front of the screen Side view is black
3
Encryption “Scrambles” data on the disk so that it cannot be read without knowing the key Can be set in folder properties Uses the account details as a key Need to export keys and save elsewhere In case account is deleted or invalid In case you want to use different computers
4
Encryption This is one of the simplest forms of encryption:
Aycqyp sqcb rfgq ambc. This is more sophisticated and demands that you have a key to decrypt it: Dygh vcnv rdhy 200 nxobj hd ufori Of course you can make it even harder: Dyg hvc nvr dhy 200 nxo bjh duf ori a b c d e f g h i j k l m n o p q r s t u v w x y z Plain text Code
5
Encryption Even if you have this table you still can’t decode without
the key!
6
When would you encrypt? to protect information from unauthorised view
credit card numbers bank account information personal health, income, tax, benefits information personal correspondence commercially sensitive information
7
Recovering encrypted data
In Windows you must create a recovery certificate for encrypted files A recovery certificate is a special Encrypting File System (EFS) certificate Requires administrator permissions Enables you to recover encrypted files if your encryption key is lost or damaged
8
Folder properties
9
Software protection Anti virus Spyware protection In teams of 2
research 5 examples of software that protects against virus and spyware Compare their features and cost Arrange them in order of your choice of the most effective Present your results
10
Password protection of files
Available on Office files
11
Digital signatures A digital signature validates the authenticity of a digital message or document. Checks the message was created by a known sender, it was not altered in transit. Mainly used for software distribution and financial transactions,
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.