K1.30 The fundamentals of network topologies and network referencing models and the application of
cyber security principles:
• topologies:
o bus
o star
o ring
o token ring
o mesh
o hybrid
o client-server
o peer-to-peer
• network referencing models:
o open systems interconnection (OSI) model:
▪ application layer
▪ presentation layer
▪ session layer
▪ transport layer
▪ network layer
▪ data link layer
▪ physical layer
o transmission control protocol/internet protocol (TCP/IP):
▪ application layer
▪ transport layer
▪ network layer
▪ network interface layer
• the minimum cyber security standards principles applied to network architecture:
o identify – management of risks to the security of the network, users and devices:
▪ assign cyber security lead
▪ risk assessments for systems to identify severity of different possible security risks
▪ documentation of configurations and responses to threats and vulnerabilities
o protect – development and application of appropriate control measures to minimise potential
security risks:
▪ implementation of anti-virus software and firewall
▪ reduce attack surface
▪ use trusted and supported operating systems and applications
▪ decommission of vulnerable and legacy systems where applicable
▪ performance of regular security audits and vulnerability checks
▪ data encryption at rest and during transmission
▪ assign minimum access to users
▪ provide appropriate cyber security training
o detect – implementation of procedures and resources to identify security issues:
▪ installation and application of security measures
▪ review audit and event logs
▪ network activity monitoring
o respond – reaction to security issues:
▪ contain and minimise the impacts of a security issue
o recover – restoration of affected systems and resources:
▪ back-ups and maintenance plans to recover systems and data
▪ continuous improvement review
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|