Please enable JavaScript.
Coggle requires JavaScript to display documents.
L03 Understand measures used to protect against cyber security incidents
L03 Understand measures used to protect against cyber security incidents
3.1 cyber security risk managment
cost benefits
makes sure that is worth it
mitigate risk
test systems and network for vulnerabilities
protect vulnerabilities
put measures in place
identifying assets and mitigate the risk
software
hardware
communication equipment
information and data
monitor and control systems
3.2 Testing and monitoring measures
Vulnerability testing
Penetration testing
Fuzzing
security funcionality
sandboxing
intrusion detention system
host intrusion detention system
intrusion prevention system
anomaly based
signatured based
honeypot
3.3 Security controls
Software
firewall
anti malware
patch managment
operating systems updates
physical
swipe cards
alarms
biometrics
Hardware
safe
cable locks
engraving
smart water
cryptography
encription
asymmetric
symmetric
only uses 1 key
procedures
Remote working
data back up
Access management