Questions About Remote Learning? Click Here

Threat prevention methods
Updated: 5/16/2020
Threat prevention methods
This storyboard was created with StoryboardThat.com

Storyboard Text

  • Hi Tyrone could you teach me a little something about Threat prevention Methods, I'm really struggling here.
  • Sure thing Bob
  • There are a number of defensive strategies and tools that have been developed to assist in preventing threats. These include encryption, firewalls, anti-virus software, biometric security, user identification and passwords, security monitors, and disaster recovery.
  • Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. In its encrypted, unreadable form it is referred to as ciphertext.
  • Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
  • Asymmetric encryption takes relatively more time than the symmetric encryption.
  • Firewall and MAC filtering are two types of cyber threat protection techniques. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.
  • MAC Filtering refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
  • You talk too much
Over 14 Million Storyboards Created
Storyboard That Family