Various wireless security
protocols were developed to protect home wireless networks. These wireless
security protocols include WEP, WPA, and WPA2, each with their own strengths
and weaknesses.
In addition to stopping
uninvited guests
from connecting to your wireless network, wireless security protocols code
your private
data as it’s
being
transmitted over the airwaves.
Data
Security
Data security refers to
protective digital privacy measures that are used to prevent
unauthorized access to computers, databases and websites. Data
security also protects data from corruption.
Examples of Data security
•software/hardware
disk encryption
backups
•data
masking
•data
erasure.
Access
security
Access
control is a security technique that can be used to regulate who or what can
view or use resources in a computing environment. There
are
two main types of access control: physical and logical. Physical access control
limits access to campuses, buildings, rooms and physical IT assets. Logical
access limits connections to computer networks, system files and data.
Examples of access security
There are two main types of access
control:
•Physical
– like passwords
•Logical
– like access rights
•
The
four main categories of access control are:
•Mandatory access control
•Discretionary access control
•Role-based access control
•Rule-based access control
Physical
Security
Physical security is the
protection of personnel, hardware, programs, networks, and data
from physical circumstances and events that could cause loss
or damage to
an enterprise, agency, or institution. This includes protection from fire,
natural disasters, burglary, theft, vandalism, and terrorism.
Examples of physical security
Physical
measures:
•Locks
•Fences
•Walls
•Safes
Surveillance
systems:
•Heat sensors
•Smoke detectors
•Alarms
•Cameras
Methods can be implemented to apprehend
attackers and to recover quickly from accidents,
fires, or natural disasters.
No comments:
Post a Comment