Data Encryption - data is 'scrambled' so that it becomes unreadable or meaningless if intercepted. A key is needed at the destination to unscramble the data again. , Usernames and Passwords - users on a network are allocated a unique ID and a randomly generated password. Each time a user logs on, the system checks their user ID and password against a database of user details., Access levels - can be classified as ‘read only’, ‘read and copy’ or ‘read and write’. Access rights are stored in a tale linked to the user ID and password., Firewalls - monitor and filter data entering or leaving a network. They us security settings to block data that does not comply with the organisation’s rules., Backups - a copy of the data can be loaded or restored on to the system if the original data is lost or corrupted,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?