week 6

R10.6 Risk mitigation controls to prevent threats to digital systems:

 

• National Cyber Security Centre (NCSC) Cyber Essentials:

o firewall to secure internet connections

o choose most secure settings for devices and software

o control access to data and services

o protection from viruses and malware

o up-to-date software and devices

 

anti-virus and anti-malware software

 

Firewalls:

o software

o hardware

 

Intrusion detection and prevention systems

 

Encryption:

o purpose

o process

o protocols

User access, policies and procedures:

o permissions

o IT user policies

 

Staff training and CPD (continuous professional development):

o human firewall

 

Back-ups:

o full

o incremental

o differential

Software and system maintenance:

o importance of latest software updates

o scheduled maintenance

o interruption to service

 

Air gaps

 

Honeypot

 

Virtual private networks (VPNs)

 

 


Last Updated
2025-05-06 15:18:45

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 5
Prev
Week 6
Prev
Week 8
Prev

Next

Next
Webmaster Spelling Notifications