File Management and Protection/Common Threats/Securing your system
File Management and Protection | |
---|---|
Common Threats | Introduction | Identifying common threats | Ensuring integrity | Securing your system | Key points | Assessment |
Securing your system
Measures are applied to secure your system against unauthorised access.
Threat | How to prevent it |
---|---|
Unauthorised access leading to data corruption or deletion of your system and data |
Install a firewall and configure it so that an alarm automatically alerts you to a system attack Use logins and passwords on systems to activate intruder detection software to lock user out Restrictions on drives, and/or files eg password protect and/or folders to protect sensitive data Lock computer rooms, security personnel, swipe cards (limiting physical access), use video surveillance |
What is a firewall?
A barrier between the internet and your computer positioned at the point of entry/exit to your PC or system (Ports).
How do you set it up?
Configure your firewall so that it automatically alerts you if something is trying illegally to enter your computer system.