cyber security

By 1704550
  • Period: to

    brief

    we will be studying which cyber security threats and voulnerabilities exist in the computing world and how to plan and manage these threats and the methods used to deal with security incidents
  • Period: to

    introduction

    we are becoming increasingly reliant on computer systems in daily life and the data that they hold is makling us more voulnerable to cyber attacks, natural disasters or loss of data due to a "0 day". All IT specialists must have a good understanding of the current threats they may face and have a plan in place for if anything happened. In this unit we will examine differant types of attacks, voulnerabilities and unseen issues we may face and how to appropriately deal with them
  • Period: to

    AO1

    We will demonstrate our knowledge and understanding of the keywords used by specialists, security threats we could face, system voulnerabilities like "0 days", the implementation of security protection methods we will use in the future and how succesful attacks will effect us
  • Period: to

    AO2

    We will apply our knowledge of security threats, system security methods and vulnerabilities and we will assess the risk of infected systems to the security of the network as a whole. we will also examine the tools available to us that will asist us in securing a system
  • Period: to

    AO3

    we will analyse forensic evidence and information to identify where a cyber attack could take place and any vulnerabilities that a hacker could abuse to gain access to the system. we will then assess how we could fix these potential breaches in the system
  • Period: to

    AO4

    we will be avaluating the protection methods and doccumentation that we can use to make an educated judgement of their efficiancy
  • Period: to

    AO5

    we will be able to plan out a secure computer network and be able to manage any security threats that we face with appropriate justification for the methods we will use