LO3

Cards (3)

  • 3.3 Cyber security controls (access controls), i.e.:
    • physical
    hardware
    software
    • data at rest, in-transit, in the cloud
    encryption including disks, databases, files, removable media, mobile devices
    cryptography
    • hard drives, external drives, USBs
    procedures
  • 3.2 Testing and monitoring measures, i.e.:
    • vulnerability testing
    • intrusion detection systems (IDS)
    • network intrusion detection systems (NIDS)
    • host intrusion detection systems (HIDS)
    • distributed intrusion detection system (DIDS),
    • anomaly-based, signature-based,
    • honeypots
    • intrusion prevention systems (IPS)
  • 3.1 Cyber security risk management, i.e.:
    • identify assets and analyse risks
    • mitigate risks by:
    o testing for potential vulnerabilities
    • monitoring and controlling systems
    • protect vulnerabilities
    cost/benefit