week 28

K1.28 Techniques applied to ensure cyber security for internet-connected devices, systems and

networks:

• wireless security – WPA2 and use of end-to-end security implemented to monitor access to WiFi

systems

• device security – password/authentication implemented to improve device security

• encryption

• virtualisation

• penetration testing

• malware protection

• anti-virus protection

• software updates and patches

• multi-factor authentication

• single logout (SLO)

 


Last Updated
2024-07-11 09:05:59

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage





Files that support this week


| | | | |
Week 27
Prev
Week 28
Prev
Week 29
Prev

Next

Next
Webmaster Spelling Notifications