C & D
Learning aim C: Examine the techniques used to protect an IT system from security threats
Physical security
Policies and procedures
Software-based protection
Learning aim D: Implement strategies to protect an IT system from security
threats
D1 Group policies
D2 Anti-malware protection
D3 Firewall configuration
D4 Wireless security
D5 Access control
D6 Testing and reviewing protection applied to an IT system
D7 Skills, knowledge and behaviours
Network Room Security
Backing-up data
Creating IT disaster recovery plans
Security audits
What to do with factory default settings for hardware and software
What to do about 'Backdoors' to software and hardware
Management of patches
Why security updates should be run.