Unit 2 AoS2 - Cyber Security: Key Knowledge
Cyber Security Trends
- emerging cyber security measures and trends such as multi-factor authentication, regulatory compliance, AI-based threat detection, Zero Trust Architecture and cryptography
Network Components and Communication
- functions and characteristics of key hardware and software components:
- routers
- switches
- firewalls
- data storage and backup systems
- network security software
- intrusion detection and intrusion prevention systems
- strengths and limitations of wired, wireless and mobile communication technologies in terms of cost, storage, reliability and security
- technical underpinnings of intranets, the internet and virtual private networks
- applications and capabilities of LANs, WANs and WPANs
Risks, Vulnerabilities and Threats
- risks of using networks in a global environment, including cyber security threats, privacy issues, legal compliance and unauthorised access
- technical underpinnings of malware such as spyware, viruses, worms and ransomware
- security threats to data and information on networks, including denial of service attacks, improper credential management, malicious software, outdated software and weak passwords
Protection Strategies
- practices for reducing risks and mitigating threats:
- firmware and operating system updates
- software malware updates
- multifactor authentication
- backup strategies
- staff procedures
- cryptographic techniques to protect data and networks:
- ciphers
- symmetric encryption
- asymmetric encryption
- the emergence of AI in network security, including traffic analysis, monitoring and notification
- the role of ethical hacking in identifying vulnerabilities and weaknesses
Legal and Industry Frameworks
- Essential Eight
- Health Records Act 2001
- Information Security Manual (networking guidance)
- Privacy Act 1988
- Privacy and Data Protection Act 2014