week 3
8.3 Threat Mitigation
8.3.1 Understand the purposes, processes, benefits and drawbacks of common
threat mitigation techniques:
• security settings:
o hardware
o software
• anti-malware software:
o function
o actions
• intrusion detection
• encryption:
o hashing
o symmetric
o asymmetric
• user access policies
• staff vetting
• staff training
• software-based access control
• device hardening
• backups:
o type (full, incremental, differential)
o safe storage
• software updates
• firmware/driver updates
• air gaps
• certification of APIs (application programme interface)
• VPNs (Virtual private networks)
• multi-factor authentication (MFA)
• password managers
• port scanning
• penetration testing:
o ethical hacking
o unethical hacking
8.3.2 Understand the processes and procedures that assure internet security,
and the reasons why they are used:
• firewall configuration:
o rules for traffic (inbound and outbound)
o traffic type rules
o application rules
o IP address rules
• network segregation:
o virtual
o physical
o offline network
• network monitoring
• port scanning.
Last Updated
2025-07-07 15:59:11
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 2←
PrevWeek 2←
PrevWeek 3←
Prev→
Next