Cyber Security and Incident Management

  • Introduction

    Understand the different types and ways a cyber attack can happen and the ways that can be used to stop them or slow them down enough for human intervention.
  • lesson 1

    looked into cybersecurity
    1 how its used by criminals
    2 how cybersecurity is constantly updated to prevent unwanted access
  • AO1

    understand the security threats, vulnerabilities, security methods and technical language
  • AO2

    Im going to apply my knowledge and understanding of system vulnerabilities, security protection methods and security threats in order to asses the risks of the system and use the appropriate tools to secure the vulnerabilities
  • AO3

    I will analyse the forensic data to identify whether a security breach has taken place and manage the security incident if it does take place.
  • AO4

    I will judge protection methods and security documents to draw conclusion about their desired result.
  • AO5

    I will be able to plan out a secure computer network and be able to manage any security incidents that do occur with the appropriate method
  • Lesson 2

    we looked a cybersecurity threats.
    1. how they can affect people and businesses
    2. how different methods are used to use threats and example of external and internal threats
  • last lesson 2

    looked at cybersecurity threats and how they can affect people and businesses internally and externally
  • lesson 3

    looked at AAA authorisation where the user provides information of who they are. authentication where the system grants permissions and access to areas to specific users. and accounting where the users footprint is tracked.
  • Lesson 4

    Learned about different types of security attacks such as a Trojan which attaches itself to non executable files like image. then about deception and how hackers use social engineering to gain personal information.
  • Lesson 5

    Cryptography private and public key encryption. OTP aka one time pad used once to decrypt messages. Used by websites and social media platforms. Access Control Lists grant and deny access to certain digital environments.
  • Lesson 6

    steganography allows for images to have hidden data inside which can be used for legal or illegal security.
    there are many different types of authentication such as retina scans and id cards.
    hashing uses bit length which are 2 to the power of the bit-length
  • Lesson 7

    the 5 9s requires a network to be up 99.999% of the time per year and is only allowed 5 minutes of downtime. single point of failure means that if that part fails the whole system goes down. fault tolerance means that a system can keep functioning even after a failure. STP made to stop redundant loops in a network.
  • Lesson 8

    FTP stands for file transfer protocol which allows for the download, upload and transferring of files from a location to another over the internet to different computer systems.
    DNS translates a domain name to an IP address so that a web browser can understand it and take the user to that page.
    HTTP hyper text transfer protocol allows for communication between web browsers and web servers.
  • Lesson 9

    Lesson 9
    communicated across remote networks using common network services. used different areas to connect to both servers and other client devices.
    FTP is unsecure as it sends data in plaintext form including username and password.
    telnet is insecure as it sends data in plaintext form and doesnt have security features.
    SSH is secure as the data sent through the network is encrypted.
  • Lesson 10

    1. physical security technology (card readers, biometrics)
    2. network based firewall for figure 2
    3. class C is .0.0 to .255.0
    4. Using a separate access point for guest devices
    5. Authorize clients appropriate access to the network
    6. remote access to the network must be available and secure
    7. use a VPN to secure and encrypt sent data
    8. if confidential information isn't secure it could be stolen
    9. could use cloud so data is accessible remotely
    10. unauthorized personnel can leave no card
  • Lesson 11

    Lesson 11
    Part B thoughts
    need to do revision of data protection act
    incident management
    security incidents may include theft of IT equipment, theft of data, unauthorised access to computer systems and infections of computer systems with malware.
    annotated door access log analysis
    review documents fully to gain important information
  • Lesson 12

    Lesson 12
    looked at all of the possible cyber security threats that could appear within the exam such as IOT devices, open ports allowing unrestricted access to classified information and visible admin server allowing hackers to access staff data.
  • Lesson 13

    Lesson 13
    FACT- reviewed the exemplar to review what could be in store for the assessment.
    EMOTION- feel like the exemplars are helping with preparing exam and that they are useful
    BENEFIT- have more overall knowledge about how the exam is going to work and what to do in different scenarios
    IDEAS- researching different cyber security methods that havent been covered would be useful.
    PLANNING- next research unique cyber security methods as well as their risks.
    JUDGEMNENT- should break down the text in part