User Access Levels implement the 'Principle of Least Privilege,' ensuring users only have the permissions necessary for their specific role.
Permission Types: Standard permissions include Read (viewing files), Write (modifying files), and Execute (running programs).
Authentication: Passwords and multi-factor authentication serve as digital locks to verify that a user is who they claim to be before granting access.
Encryption transforms data into an unreadable format using an algorithm; even if data is intercepted, it cannot be understood without the correct decryption key.
Physical Barriers: Security measures like locked server rooms, CCTV, and biometrics (fingerprints/retinal scans) prevent direct physical tampering with hardware.
Input Validation: This technique prevents SQL injection by sanitizing data entered into web forms, ensuring malicious code cannot be executed against a database.
| Feature | Firewall | Anti-Malware |
|---|---|---|
| Primary Goal | Control network traffic flow | Detect and remove malicious files |
| Location | Network boundary or host OS | Installed on individual devices |
| Method | Packet inspection & rules | Signature & behavior scanning |
| Method | Penetration Testing | Physical Security |
| --- | --- | --- |
| Nature | Proactive digital simulation | Tangible environmental controls |
| Target | Software/Network vulnerabilities | Hardware and facility access |
Identify the Threat First: When asked for a prevention method, first identify the specific attack (e.g., use Firewalls for DDoS, but Anti-malware for Viruses).
Describe, Don't Just Name: In long-answer questions, always explain how the method works (e.g., 'Firewalls scan packets against a set of rules').
Check for Redundancy: If a scenario mentions protecting a whole office, suggest a hardware firewall; if it mentions a remote laptop, suggest a software firewall.
Common Mistake: Do not confuse encryption with a firewall; encryption protects data content, while a firewall protects the connection.