Skip to content

Unit 2 AoS2 - Cyber Security: Key Knowledge

  • emerging cyber security measures and trends such as multi-factor authentication, regulatory compliance, AI-based threat detection, Zero Trust Architecture and cryptography

Network Components and Communication

  • functions and characteristics of key hardware and software components:
  • routers
  • switches
  • firewalls
  • data storage and backup systems
  • network security software
  • intrusion detection and intrusion prevention systems
  • strengths and limitations of wired, wireless and mobile communication technologies in terms of cost, storage, reliability and security
  • technical underpinnings of intranets, the internet and virtual private networks
  • applications and capabilities of LANs, WANs and WPANs

Risks, Vulnerabilities and Threats

  • risks of using networks in a global environment, including cyber security threats, privacy issues, legal compliance and unauthorised access
  • technical underpinnings of malware such as spyware, viruses, worms and ransomware
  • security threats to data and information on networks, including denial of service attacks, improper credential management, malicious software, outdated software and weak passwords

Protection Strategies

  • practices for reducing risks and mitigating threats:
  • firmware and operating system updates
  • software malware updates
  • multifactor authentication
  • backup strategies
  • staff procedures
  • cryptographic techniques to protect data and networks:
  • ciphers
  • symmetric encryption
  • asymmetric encryption
  • the emergence of AI in network security, including traffic analysis, monitoring and notification
  • the role of ethical hacking in identifying vulnerabilities and weaknesses
  • Essential Eight
  • Health Records Act 2001
  • Information Security Manual (networking guidance)
  • Privacy Act 1988
  • Privacy and Data Protection Act 2014