Key cryptography methods
B3 Applications of cryptography
The types and applications of cryptography.*
Learning aim D:
Implement strategies to protect an IT system from security threats
D1 Group policies
Tools for managing a set of IT systems.
D2 Anti-malware protection
Installation of anti-malware software, configuration of anti-malware scanning schedules.
D3 Firewall configuration
D4 Wireless security
Wireless encryption methods, e.g. Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), WPA2.
Configuration of wireless router security settings.
D5 Access control
Design and implementation of hardware and software access control regimes.
Defining legitimate users, groups and the resources they need to access and the levels of access they need.
Defining password policies.
D6 Testing and reviewing protection applied to an IT system
Ensuring rules created do not prevent users from accessing resources required to do their job.
Assessment 2
(learning aims C and D)
Learning Outcomes (what the learner will be able to do)
Capture and identify packets using Wireshark or other software
Assignment Preparation
GCD & how to work them out
Euclids Algorithm
Plan and develop content for A2T1
Assignment: Learners to have a full description of the requirements for A2T1. They must work independently on the assignment for learning aims C and D. Learners complete this outside class time.
Today I learned about encryption, and also about the security of computer systems. I feel that I did do a good job doing some work on my assignment, however I feel that I failed in getting sufficient progress done. On reflection I should have worked harder. The deadline for the U7 A2 assignment is today, and for the U14 A1 T1 assignment it is 14/02/2020.
No comments:
Post a Comment