-
Evaluate the proposed security measures and documentations to make a decision based on their efficiency and whether in conclusion it should be used.
-
Throughout this unit, I'll be investigating the different types of threats to our modern online systems that our society has become reliant on in this technological era as well as the vulnerabilities that exist within the networks we all use and the methods used to defend such systems.
I'll also be looking at relevant security incidents to draw understanding from them and come up with solutions to combat such incidents in the future. -
Come up with a plan for a secure computer network and manage any security incidents with appropriate action and justification for such.
-
Display a knowledge and understanding of the technical language, security threats, vulnerabilities within systems and how we can protect them along with understanding the consequences of successful cyber attacks.
-
Apply previously acquired knowledge in order to risk assess systems and use the right tools to make them more secure for people to use and to ensure data is protected.
-
Here I'll be analyzing forensic evidence data for the purpose of identifying security breaches and coming up with solutions to manage these security incidents.