week 19

K1.19 The purpose of technical security controls as risk mitigation techniques and their applications to

business risks within a digital infrastructure context:

• purpose – to improve network security for users and systems

• technical security controls and their applications:

o 5 cyber essentials controls:

▪ boundary firewalls and internet gateways – restricting the flow of traffic in systems

▪ secure configuration – ensuring user only has required functionality (for example removing

unnecessary software, configuration to limit web access)

▪ malware protection – maintaining up-to-date anti-malware software and regular scanning

▪ patch management – maintaining system and software updates to current levels

▪ access control – restricting access to a minimum based on user attributes (for example

principle of least privilege, username and password management)

o device hardening – removing unneeded programs, accounts functions, applications, ports,

permissions and access

o segmentation – network, systems, data, devices and services are split up to mitigate the potential

impact of risks

o hardware protection – using server and software solutions to protect hardware and data

o multi-factor authentication – allowing 2 devices to authenticate against one system to confirm

who and where the user is trying to access from

o remote monitoring and management (RMM) (for example end user devices)

o vulnerability scanning (for example port scanning, device scanning)


Last Updated
2024-07-11 08:59:16

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage





Files that support this week


| | | | |
Week 18
Prev
Week 19
Prev
Week 20
Prev

Next

Next
Webmaster Spelling Notifications