-
Introduction
Humans relying on computer systems and data they contain is very dangerous as the all the data can gets stolen form cyber attacks and as we improve our security to prevent attack they are more developed attacks being developed. All of our IT staff professionals should have a good understanding of preventing these attack if they happen. Overall in this unit you will have to understand the vulnerabilities of a network and any techniques to defend the network. -
Assessment Outcomes2
AO4-You will now evaluate security documents and protection methods to judge and give conclusions about their efficacy.
AO5-You will now using all your knowledge plan your own secure computer network and manage any security incidents that occur and give reasonable justifications. -
Assessment Outcomes
AO1- You will have to exhibit your understanding and knowledge of security threats, system vulnerabilities and protection methods.
AO2-You will now apply your knowledge of security threats and risk assess systems and use the certain tools to protect the system.
AO3-You will have to examine forensic evidence data and then identify the breaches in your systems and manage security threat incidents. -
Recap Last lesson 23/09/21 and this lesson 30/09/21
Last lesson we learnt about networks for example the advantages and disadvantages of wired and wireless networks and we learnt about MD5 and SHA 1 features. This lesson we learnt about viruses and how they are used to deploy harmful attacks on networks. -
Recap last lesson 30/09/21
last lesson we learnt about attacks on a network and computer system such as viruses and other harmful attacks and how they are used to initiate these attacks. -
This Lesson 07/10/2021
this lesson we learnt about cryptography, access control and obscuring data such as symmetric and asymmetric algorithms. -
Recap Last lesson 07/10/21
last lesson we looked at access control lists and cryptography and understanding asymmetric and symmetric algorithms. -
this lesson 14/10/21
This lesson i learned about how much bits a ip address has and how to convert ip addresses to binary. Also we started our assignment defining methodologies. -
exam paper
Recap last lesson i focused on exam paper a and i decided i needed to focus on the security plan as i don't really understand it that much don't know what IPV4 class c addressee is and the risk assessment which confuses me because i don't know what to write; I don't understand how to design cyber security protection ,measures. -
this lesson
this lesson revised various exam papers and wrote down some notes and did research on network threats of cybersecurity.