Save
IT
Unit 3 - mine
From My book
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Sophie _Xx
Visit profile
Cards (10)
Types of Cyber Security Incidents
unauthorised
access
information disclosure
modification
inaccessible data
destruction
theft
What are the two types of modification of data
Accidental
and
Intentional
What must you consider in risk management
Identify
assets
and analyse
risks
Mitigate
risks
Protecting vulnerabilities
Remediation
Cost benefit
Monitoring
and controlling
Why should we identify assets?
So you know what the
target
could be
Why do we need to know the cost of the asset
To see if the
cost of protection methods
match the cost of asset
How to mitigate risk
control systems
Log files
Vulnerability scanners
Risk management policies
Methods for remediation
Patch deployment
Manual
Automated tools
What are the 6 topics within the vulnerability management life cycle
Identify risks
Priorities
assets
Assess
Report
Remediate
Verify
What is the importance of logging acitivty
Able to track possible
incidents
within the organisation
Spot
patterns
encase of
attacks
or identify attacks
What are the key things you must consider testing
Social Engineering
of
employees
Physical security
Network services