Unit Btec Diploma It

Topics: Cryptography, Computer, Data Protection Act 1998 Pages: 4 (950 words) Published: December 10, 2012
P3 describe how software and network security can keep systems and data secure

Public Key: a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures

Private Key: Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private.

Handshaking: The process by which two devices initiate communications. Handshaking begins when one device sends a message to another device indicating that it wants to establish a communications channel. The two devices then send several messages back and forth that enable them to agree on a communications protocol.

Use of backups: In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.

Audit logs: Audit logs allow computer administrators to get a good idea of where visitors are coming from, how often they return, and how they navigate through a site

Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Virus checking software: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets. VPN (virtual private network): A VPN is a private network that uses a public network...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • unit 1 btec Essay
  • BTEC Unit 2 P3 Essay
  • BTEC Extended Diploma Unit 5: Business environment Essay
  • btec Essay
  • Btec level 2 unit 16 Essay
  • Btec business unit 4 D2 Essay
  • NEBOSH International Diploma Unit D Essay
  • Essay about P1 unit 3 Ict btec

Become a StudyMode Member

Sign Up - It's Free