Task 1
Passwords
Passwords are one of the most effective way to make systems secure, this is because of the
simplicity and security level they provide. A password can be a combination of letters
numbers and symbols, depending on the network system. Passwords are also beneficial as
they can detect unauthorised users, if a user inputs the wrong password more than a certain
amount of times the access is denied regardless. Another benefit of using passwords is that
they are easy to recover through the user’s email address, it only takes few minutes to
regain access to the network if a password is lost or stolen.
Authorisation permissions and access control lists
Authorisation permissions and access control lists are very powerful and useful settings
when protecting a network. These can be set on any kind of data and are mostly used in
businesses but also locally on home computers. To edit and change authorisation
permissions you have to access the server as an administrator, this means that you can
access all the data and set up different permissions for different users. In a business the
higher your rank is for the company the more data you will be able to access; this means
that a manager will be authorised to access data that a normal employee is not able to
access. Administrators can use access control lists to give access to other users depending
on the necessities in order to complete a task or do their job.
Backing up and restoring
Backing up and restoring is a very useful method to protect a network. All sensitive files
should be backed up either online or offline, backups can be stored on cloud storage offered
by organisations in exchange of monthly payments as well as in an external storage device
such as a hard disk drive. Backups are essential for a business as faults or mistake can often
occur and the business should be ready to deal with the loss of data at any time, if backups
are kept correctly any data loss won’t result in a major loss of money and time as all the
information will be restored. Backups are also helpful to prevent consequences of
unauthorised access, this means that if a hacker steals or deletes data, thanks to the
backups the organisation will be able to restore any file.
Encrypting
Encryption is the most powerful method of protecting data over a network, this means that
all the data and information flowing across the network will be turned into code that an
unauthorised user will not be able to understand even in case he is able to access it.
Encryption code is very hard to decrypt, and this is why it is used by the biggest organisation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Siratt. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £0.00. You're not tied to anything after your purchase.