week 6
R10.6 Risk mitigation controls to prevent threats to digital systems:
• National Cyber Security Centre (NCSC) Cyber Essentials:
o firewall to secure internet connections
o choose most secure settings for devices and software
o control access to data and services
o protection from viruses and malware
o up-to-date software and devices
anti-virus and anti-malware software
Firewalls:
o software
o hardware
Intrusion detection and prevention systems
Encryption:
o purpose
o process
o protocols
User access, policies and procedures:
o permissions
o IT user policies
Staff training and CPD (continuous professional development):
o human firewall
Back-ups:
o full
o incremental
o differential
Software and system maintenance:
o importance of latest software updates
o scheduled maintenance
o interruption to service
Air gaps
Honeypot
Virtual private networks (VPNs)
Last Updated
2025-05-06 15:18:45
Links to Learning Outcomes |
|
Links to Assessment criteria |
|
|
|
English
Maths
How 2's Coverage
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Files that support this week
Week 5←
PrevWeek 6←
PrevWeek 8←
Prev→
Next→
Next