week 3

8.3 Threat Mitigation

 

8.3.1 Understand the purposes, processes, benefits and drawbacks of common

threat mitigation techniques:

• security settings:

o hardware

o software

• anti-malware software:

o function

o actions

• intrusion detection

• encryption:

o hashing

o symmetric

o asymmetric

• user access policies

• staff vetting

• staff training

• software-based access control

• device hardening

• backups:

o type (full, incremental, differential)

o safe storage

• software updates

• firmware/driver updates

• air gaps

• certification of APIs (application programme interface)

• VPNs (Virtual private networks)

• multi-factor authentication (MFA)

• password managers

• port scanning

• penetration testing:

o ethical hacking

o unethical hacking

8.3.2 Understand the processes and procedures that assure internet security,

and the reasons why they are used:

• firewall configuration:

o rules for traffic (inbound and outbound)

o traffic type rules

o application rules

o IP address rules

• network segregation:

o virtual

o physical

o offline network

• network monitoring

• port scanning.


Last Updated
2025-07-07 15:59:11

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 2
Prev
Week 2
Prev
Week 3
Prev

Next