P3 describe how software and network security can keep systems and data secure
Public Key: a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures
Private Key: Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private.
Handshaking: The process by which two devices initiate communications. Handshaking begins when one device sends a message to another device indicating that it wants to establish a communications channel. The two devices then send several messages back and forth that enable them to agree on a communications protocol.
Use of backups: In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
Audit logs: Audit logs allow computer administrators to get a good idea of where visitors are coming from, how often they return, and how they navigate through a site
Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Virus checking software: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets. VPN (virtual private network): A VPN is a private network that uses a public network...
Please join StudyMode to read the full document