K1.28 Techniques applied to ensure cyber security for internet-connected devices, systems and
networks:
• wireless security – WPA2 and use of end-to-end security implemented to monitor access to WiFi
systems
• device security – password/authentication implemented to improve device security
• encryption
• virtualisation
• penetration testing
• malware protection
• anti-virus protection
• software updates and patches
• multi-factor authentication
• single logout (SLO)
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|