Save
IT
Unit 3 - mine
LO3
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Sophie _Xx
Visit profile
Cards (3)
3.3
Cyber security
controls (
access controls
), i.e.:
• physical
•
hardware
•
software
• data at rest, in-transit, in the cloud
•
encryption
including disks, databases, files, removable media, mobile devices
•
cryptography
• hard drives, external drives, USBs
•
procedures
3.2
Testing and monitoring measures
, i.e.:
vulnerability testing
intrusion detection systems
(IDS)
network intrusion detection systems
(NIDS)
host intrusion detection systems
(HIDS)
distributed intrusion detection system (
DIDS
),
anomaly-based
,
signature-based
,
honeypots
intrusion prevention systems
(IPS)
3.1
Cyber security
risk management
, i.e.:
• identify
assets
and analyse risks
• mitigate risks by:
o testing for potential
vulnerabilities
• monitoring and controlling systems
• protect vulnerabilities
•
cost/benefit