Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO3 Understand measures used to protect against cyber security incidents…
LO3 Understand measures used to protect against cyber security incidents
3.1 Cyber security risk management
Identify assets and mitigate the risk
Hardware
Software
Communication equipment
Information and data
Mitigate risk
test systems and network for vulnerabilities
Monitor and control systems
Protect vulnerabilities
Put measures in place
Cost benefits
Cost implications
3.2 Testing and monitoring measures
Vulnerability testing
Penetration Testing
Fuzzing
Security functionality
Sandboxing
Intrusion detection system
Network intrusion detention system
Host intrusion detention system
Distributed intrusion detection system
Intrusion prevention system
Anomaly based
Signature based
Honeypot
3.3 Security Controls
Physical
biometrics
swipe cards
alarms
Hardware
Safe
cable locks
engrave
Smart Water
Software
anti-malware
firewal
patch management
operating systems updates
Encryption
Asymmetric encryption
Symmetric
Cryptography
Procedures
Access management
Data backup
Remote working