Wednesday 5 February 2020

Both sessions - 05/02/2020

B2 Cryptographic methods
Key cryptography methods
B3 Applications of cryptography
The types and applications of cryptography.*

Learning aim D:
Implement strategies to protect an IT system from security threats
D1 Group policies
Tools for managing a set of IT systems.
D2 Anti-malware protection
Installation of anti-malware software, configuration of anti-malware scanning schedules.
D3 Firewall configuration
Hardware and/or operating system-embedded firewalls, including configuration of:
inbound and outbound rules to control network connections that are allowed and prevent all other unauthorised connections
firewall events and interpretation of log entries.
D4 Wireless security
Wireless encryption methods, e.g. Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), WPA2.
Configuration of wireless router security settings.
D5 Access control
Design and implementation of hardware and software access control regimes.
Defining legitimate users, groups and the resources they need to access and the levels of access they need.
Defining password policies.
White listing of applications trusted signed binaries.
Data hiding when viewing logs and visibility of sensitive data.
Defining users with special privileges.
D6 Testing and reviewing protection applied to an IT system
Ensuring rules created do not prevent users from accessing resources required to do their job.
Firewall testing to check the firewall blocks unauthorised traffic and allows legitimate traffic through.
Viewing and interpreting activity logs.
Judging the effectiveness of protection and making recommendations for further improvements.

Assessment 2
(learning aims C and D)

Learning Outcomes (what the learner will be able to do)
Capture and identify packets using Wireshark or other software
Assignment Preparation
GCD & how to work them out
Euclids Algorithm
Plan and develop content for A2T1

Assignment: Learners to have a full description of the requirements for A2T1. They must work independently on the assignment for learning aims C and D. Learners complete this outside class time.

Today I learned about encryption, and also about the security of computer systems. I feel that I did do a good job doing some work on my assignment, however I feel that I failed in getting sufficient progress done. On reflection I should have worked harder. The deadline for the U7 A2 assignment is today, and for the U14 A1 T1 assignment it is 14/02/2020.

No comments:

Post a Comment