Managing Threats to Digital Systems: Overview & Strategies

Managing Threats to Digital Systems: Overview & Strategies
Slide Note
Embed
Share

effective methods for addressing threats to digital systems, including external and internal attacks, security breaches, and the importance of disaster recovery policies. Learn about key terms, security measures, firewalls, ethical hacking, encryption, and more.

  • Digital security
  • Threat management
  • Cyber threats
  • Disaster recovery
  • Information protection

Uploaded on Feb 15, 2025 | 2 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Component 3 Learning Aim B Revision Mind Maps Threats to digital systems and how an organisation can manage them.

  2. Key Terms Intellectual Property Ransomware Malware Denial-of-Service (DoS) attacks Cybersecurity An external attack is External attack methods include: Impacts of security breach Immediate Impact Longer-term Impact Internal security threats: Reasons why systems are attacked Key Terms Social Engineering Phishing Pharming Productivity An internal attack is

  3. Permitted access means Benefits Drawbacks Examples of physical security measures: Passwords are Passwords can take several different forms, such as: Benefits Drawbacks Benefits Drawbacks Examples of biometric security measures: How does 2 factor authentication work? Benefits Drawbacks What are biometrics?

  4. A firewall is Key Terms: Firewall Local Area Network (LAN) Access Control List (ACL) Shoulder Surfing Session Cookies Worms Trojans Rootkit Spyware A software firewall A hardware firewall Benefits of firewalls Drawbacks of firewalls What is malware? Anti-virus software is Advantages Different types of malware: Disadvantages Common techniques used to make applications easier to use Most websites obscure data entry Advantage? Avoids the need to remember passwords Some sites allow the user to stay logged in BUT

  5. Ethical hacking is Key Terms: Vulnerable Security patches Privilege What is device hardening? Steps of penetration testing: Examples of device hardening techniques: Benefits of pen testing Drawbacks of pen testing Advantages Encryption is Disadvantages Encryption algorithm + key

  6. Why are disaster recovery policies created? Considerations when writing a disaster recovery policy: Types of disaster Dos and Don ts for password creation Examples of security policies: What is an AUP? What are the risks of installing and using unapproved software? Password Strength? Examples PASSWORD, 123456 LiverPool5 A?vEr8gS! Actions to take after attack: 1. 2. 3. 4. 5.

Related


More Related Content