3.4.7+Data+Security

=**__Describe suitable methods to ensure data security__**=

__Data Encryption__
 * The transforming of data into a format that is only readable by the sender and receiver of the message
 * This is used in data transmissions because the transmissions can be intercepted by others, who can then access the data

__Key__
 * A randomly chosen parameter that determines whether the output of an encrypted file will have any valid output

__Passwords__
 * A password is a set of characters that serve as a key to open or access certain files
 * This is needed in order to protect certain files from unauthorized users to access or copy them
 * Passwords are used very often in electronics from accounts in computer networks, WiFi networks, or encrypted files

__Physical Security__
 * Physical security is the most important because it prevents people from just going in to remove or add a device to a network or a computer.
 * No matter how much encryption or passwords one would have, if there is no physical security none of that helps much

__Levels of Access for users (Permissions)__


 * **Administrator**: Normally has all rights i.e. read & write, all access to all files
 * **Normal user**: Has rights to read and write depending on the type, location or owner of file the user wants to write to
 * **Guest user**: Can normally only read files and has very limited access

Edited By: Daniel Gillo Last edited: 31st January 2011

Sources
 * Jones, Richard. __Computer Science Java Enabled__. Victoria: IBID Press, 2004.
 * "Key (cryptography)." __Wikipedia, The Free Encyclopedia__. 13 December 2010. Wikimedia Foundation. 31 January 2011. __http://en.wikipedia.org/wiki/Key_%28cryptography%29__