Information Technology

  • Period: to

    Assessment Outcome 4

    Evaluate the proposed security measures and documentations to make a decision based on their efficiency and whether in conclusion it should be used.
  • Period: to

    Introduction

    Throughout this unit, I'll be investigating the different types of threats to our modern online systems that our society has become reliant on in this technological era as well as the vulnerabilities that exist within the networks we all use and the methods used to defend such systems.
    I'll also be looking at relevant security incidents to draw understanding from them and come up with solutions to combat such incidents in the future.
  • Period: to

    Assessment Outcome 5

    Come up with a plan for a secure computer network and manage any security incidents with appropriate action and justification for such.
  • Period: to

    Assessment Outcome 1.

    Display a knowledge and understanding of the technical language, security threats, vulnerabilities within systems and how we can protect them along with understanding the consequences of successful cyber attacks.
  • Period: to

    Assessment Outcome 2

    Apply previously acquired knowledge in order to risk assess systems and use the right tools to make them more secure for people to use and to ensure data is protected.
  • Period: to

    Assessment Outcome 3

    Here I'll be analyzing forensic evidence data for the purpose of identifying security breaches and coming up with solutions to manage these security incidents.