Computer Science – 6.1 Data Security | e-Consult
6.1 Data Security (1 questions)
Two different security controls are firewalls and multi-factor authentication (MFA).
Firewalls: A firewall acts as a barrier between a network and external threats. It examines network traffic and blocks or allows it based on pre-defined rules.
- Strengths: Effective at preventing unauthorized access from external networks, can be configured to block specific types of traffic, and provides a layer of defence against various attacks.
- Weaknesses: Can be bypassed if misconfigured, may not protect against threats originating from within the network, and can impact network performance if not properly managed.
- Effective Situation: Protecting a company's internal network from external hackers and malware. A firewall can be configured to block known malicious IP addresses and prevent unauthorized access to sensitive resources.
Multi-Factor Authentication (MFA): MFA requires users to provide multiple forms of identification before granting access to a system. This typically involves something the user knows (password), something the user has (security token or mobile app), and/or something the user is (biometric data).
- Strengths: Significantly reduces the risk of account compromise, even if a password is stolen. Provides a strong layer of authentication.
- Weaknesses: Can be inconvenient for users, may require additional hardware or software, and can be vulnerable to social engineering attacks if users are tricked into revealing their second factor.
- Effective Situation: Protecting access to sensitive data, such as financial accounts, email, and cloud storage. MFA makes it much harder for attackers to gain unauthorized access, even if they have stolen a user's password.