Security Mechanisms
Security Mechanisms
CAPES NOTES
Objective #14 & 15: Compare various security mechanisms & Explain the meaning of
1. Fire/water proof cabinets - These are used to keep valuable files, money and other important
items safe, in the event of a fire. These cabinets are also designed to protect the stored valuables
from water damage.
2. Archiving- This is when data that is no longer being used or active, is moved to a different
location from files currently being used. An example would be removing old mails in Gmail or
yahoo account and storing them in a place or location by themselves.
3. Backup and recovery procedures – This is when a copy is made of important data, in the
case of something going wrong on a computer system (machine no longer works) or files
become lost.
4. Propriety data and software- This is when data can be stored in formats that may not be
compatible with another software. These types of software are normally copyrighted and has a
Security Mechanisms
limitation to the extent to which it may be used. For example, Microsoft word may give users to
ability to use Microsoft Office Word 2013 to an extent as a trial version.
2. Encryption- Encryption is when data is converted or translated into a secret code. The
scrambled data can only be accessed by someone who has the right encryption key (code) or
password.
3. Authentication- The process of verifying or identifying a user of a device, usually based on a
username and password.
4. Swipe/Key card- Refers to a plastic card which gives access to an individual to proceed
through electronically powered doors. These cards normally contain magnetically encoded
information, which when read, provides access/ entrance into a location. Swipe cards are
normally read by swiping it into a prescribed slot; whereas, a keycards or normally put closed to
the sensor or access spot to allow access.
5. Biometric- Biometric systems is a technological system that uses information about a person,
such as voice, fingerprints, facial recognition, among others.
6. Data integrity- This refers to the accuracy and consistency (validity) of data over its lifecycle.
7. Data Corruption- Data corruption refers to errors in computer data that happens as a result of
writing, reading, storing, processing or transmitting, which introduces unintended changes to
original data.
Security Mechanisms
Objective # 16: Describe the structure of the World Wide Web (WWW) as interconnected
hypertext documents;
Hyperlinks
Hyperlink is a reference to data that a user can click, tap or hover over in order to access an
internal or external file or page.
Home page
The homepage refers to the default page on which a webpage/websites normally loads. It is the
first page and often give details of what the webpage/website is about and contains.