click below
click below
Normal Size Small Size show me how
DIT Acc Sec Per
BTEC DIT Access, Security and Permissions Terms
| Term | Definition |
|---|---|
| Rules that control who can view, edit, or delete files or data. | Access Permissions |
| Giving users access based on their job role. | Role-Based Access Control (RBAC) |
| Extra security that requires two ways to prove identity (e.g. password and code). | Two-Factor Authentication (2FA) |
| Security software or hardware that blocks unauthorised access to a network. | Firewall |
| A secure connection that protects data when using the internet. | Virtual Private Network (VPN) |
| A security method that allows only approved devices to connect to a network. | MAC Filtering |
| Scrambling data so it cannot be read by unauthorised users. | Data Encryption |
| A deliberate attempt to damage, steal, or access data or systems illegally. | Cyber Attack |
| Pretending to be another device to gain unauthorised access. | Device Spoofing |
| When data is secretly captured while being sent over a network. | Data Interception |