unit 7 overview

Get Started. It's Free
or sign up with your email address
Rocket clouds
unit 7 overview by Mind Map: unit 7 overview

1. Software-based protection

1.1. Anti-virus software and detection techniques, including virus signatures, heuristic techniques used to identify potentially suspicious file content, techniques for dealing with identified threats.

1.2. Software and hardware firewalls and the filtering techniques they use, including packet filtering, inbound and outbound rules, and network address translation.

1.3. Intrusion detection systems (IDSs), including setting signatures, establishing requirements, traffic monitoring.

1.4. Domain management, including prevention of unintended devices joining a system.

1.5. User authentication, including user log-on procedures, strong passwords, text and graphical passwords, biometric authentication, two-step verification, security tokens (e.g. USB-based keys), knowledge-based authentication (e.g. question and response pairs), Kerberos network authentication for Windows® - and Linux® -based systems, certificatebased authentication.

1.6. Access controls and the methods they use to restrict authorised/unauthorised users access to resources (user groups and the access rights allocated to them such as folders, files and physical resource such as printers), e.g. Windows® NTFS file permissions, Linux® octal file permissions.

2. Section D

2.1. D2 Anti-malware protection   Installation of anti-malware software, configuration of anti-malware scanning schedules.

2.2. D1 Group policies

2.2.1. Tools for managing a set of IT systems.

2.3. D4: Wireless Sercurity

2.3.1. Wireless encryption methods, e.g. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2

2.3.2. Configuration of wireless router security settings.

2.3.3. Tools for managing a set of IT systems.

2.3.4.  Run system scans of all relevant hardware and software on secured system using common testing tools.

2.3.4.1. Network testing tools, including scanners, security-based operating system distribution, sniffers.

2.3.4.1.1. Viewing and interpreting activity logs.

2.4. D6 testing and reviewing protection applied to an IT system

2.5. Firewall testing to check the firewall blocks unauthorised traffic and allows legitimate traffic through

2.5.1.  Systematically test ‘allowed’ and ‘blocked’ entry points.

2.6. D5: Access Controll

2.6.1. Design and implentation

2.6.2. Defining and legitimate users and groups

2.6.3. Defining password polices

2.7. D7 skills knowledge and behaviour

2.7.1. planning and recording

2.7.2. reviewing and responding to outcomes

2.7.3. communicating skills

2.7.3.1. conveying intended meaning

2.7.3.2. use of tone and language

2.7.3.3. responding contructively to the contributions of others

2.7.4. demonstrate own behaviours

2.7.5. evaluate outcomes

2.7.6. evaluate processes and outcomes

3. C2

3.1. organisation policies and their application, including internet and email use policies, security and password procedures, staff responsibilities, training of staff on IT security issues, disciplinary procedures

3.2. management of patches for hardware (firmware) and software (operating systems, security applications)

3.3. installation of applicable security updates, including rollout management, minimising disruption, sandbox testing of updates and establishing potential risks

3.4. any rules created do not impede normal business operation for an individual and organisation: o ingress and egress of expected network traffic o server interconnectivity o time-based, allowing/preventing resource access o allowing external access to internal servers o allowing data interchange between suppliers, business partners, external cloud-based solutions o the impact of aggressive email filters o use of different software by different individuals.

3.5. default ‘factory settings’ and ‘reset’ options are removed from hardware and software configuration

3.6. any known backdoors are removed

4. Leaning Aim C

4.1. C3

4.1.1. default ‘factory settings’ and ‘reset’ options are removed from hardware and software configuration

4.1.2.  Building and computer/network room security, e.g. door locks, card-key entry, closed circuit television (CCTV), voice control and biometrics such as facial recognition, fingerprint and iris scans, DNA identification technology.  Servers, routers, switches kept in a secure location with controlled access.  Backing up data, e.g. full, differential and incremental back-ups, use of a fire safe and offsite storage of data.  IT disaster-recovery plan

4.2. C1

4.2.1.  Building and computer/network room security, e.g. door locks, card-key entry, closed circuit television (CCTV), voice control and biometrics such as facial recognition, fingerprint and iris scans, DNA identification technology.  Servers, routers, switches kept in a secure location with controlled access.  Backing up data, e.g. full, differential and incremental back-ups, use of a fire safe and offsite storage of data.  IT disaster-recovery plan

5. Learning aim A

5.1. A1 Threat Types

5.1.1. Internal Threats

5.1.2. External Threats

5.1.3. Physical Threats

5.1.4. Social Engineering

5.2. A3 Information Security

5.2.1. Principles of confidentiality

5.2.2. Unauthorised access

5.2.3. Principle of minimal access to information

5.2.4. Deliberate or accidental loss of information

5.2.5. The need to protect intellectual property

5.3. A2 Computer network-based threats

5.3.1. Passive Threats

5.3.2. Active Threats

5.3.3. Cloud Computing Security Risks

5.4. A4 Legal Requirements

5.4.1. Data Protection Act 1998 and the requirements it places on organisations to keep data about stakeholders secure

5.4.2. Computer Misuse Act 1990, and its definitions of illegal practices and applications

5.4.3. Copyright, Designs and Patents Act 1988 and its requirements in terms of protecting software products and digital media such as music and films

5.4.4. Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 and its requirements to allow companies to monitor employees’ communication using IT systems and other uses of the internet while at work

5.4.5. Fraud Act 2006 and its requirements to deal with services using IT-based methods to steal information for fraudulent purposes

5.4.6. Legal liability and contractual obligations

5.5. A5 Impact Of Security Breaches

5.5.1. operational impact on an organisation of the loss of data or service

5.5.2. financial impact of loss of service, such as an ecommerce website

5.5.3. damage to reputation

5.5.4. legal consequences of data privacy breaches

5.5.5. forensics research requirements to identify data lost, stolen or copied

6. Learning aim B

6.1. B3 Part 2

6.1.1. HTTPS protocol

6.1.1.1. Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to.

6.1.2. virtual private networks (VPN's)

6.1.3. Generic Routing Encapsulation (GRE) tunnels

6.1.4. encryption of data on wifi networks.

6.2. B3 Part 1

6.2.1. symmetric key encryption

6.2.1.1. Symmetric Key encryption is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Contrast this with public-key cryptology, which utilizes two keys - a public key to encrypt messages and a private key to decrypt them.

6.2.2. public key encryption

6.2.2.1. Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely paired with private keys which are known only to the owner.

6.2.3. key exchanges (Diffe-Hellman)

6.2.3.1. Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES.

6.2.4. digital certificates (including certificate authorities)

6.2.4.1. Digital Certificates are a means by which consumers and businesses can utilise the security applications of Public Key Infrastructure (PKI).

6.3. B2 Cryptography methods

6.3.1. shift ciphers, one-time pads, hash functions

6.3.2. cryptographic primitives

6.3.3. cryptographic salts and their use in storing passwords

6.3.4. encryption algorithms

6.3.5. mathematical principles

6.4. B1

6.4.1. including digital rights management (DRM)

6.4.2. password storing and salts

6.4.3. obfuscation and steganography

6.4.4.  The principles and uses of encryption

7. What is love?

7.1. Baby dont hurt me

7.1.1. dont hurt me

7.1.1.1. no more..