Unit 7 – IT System Security and Encryption

Understand current IT security threats, information security and the legal requirements affecting the security of IT systems

Threat types

Internal threats

External threats

Physical threats

Social engineering and software-driven threats

Computer network-based threats

Passive threats

Active threats

Cloud computing security risks

Information security

Principles of confidentiality

Unauthorised access or modification of information

Principle of minimum access

Deliberate or accidental loss of information

Intellectual property protection

Legal Requirements

Data protection legislation

Computer misuse legislation

Copyright, designs and patents legislation

Legal liability and contractual obligations

Impact of Security Breaches

Operational impact

Financial impact

Damage to reputation

Legal consequences

Forensics research requirements

Cryptographic techniques and processes for data protection

Cryptographic principles

Principles and uses of encryption

Legal and ethical issues

Computational hardness assumption

Cryptography methods

Ciphers, one-time pads, hash functions

Cryptographic primitives

Cryptographic salts

Encryption algorithms

Mathematical principles

Applications of cryptography

Symmetric key encryption

Public key encryption

Key exchanges

Digital certificates

HTTPS protocol

Virtual Private Networks

Generic Routing Encapsulation (GRE) tunnels

Encryption of data on WiFi networks

Techniques used to protect IT system from security threats

Physical security

Locational security

Access control

Offsite backup

Disaster recovery plan

Software-based protection

Anti-virus software

Software and hardware firewalls

Intrusion detection systems

Domain management

User authentication

Strategies to protect an IT system from security threats

Group policies

Tools for managing a set of IT Systems

Anti-malware

Installation and configuration of

Firewall configuration

Inbound and outbound rules

Events and log entries

Wireless security

WEP, WPA, WPA2

Access control

Defining users and groups

Password policies

White-listing approved binaries

Data-hiding when viewing logs

Users with special privileges

Testing and reviewing protection

Firewall testing

System scans

Network testing tools

Judging effectiveness and making recommendations for improvement