CS40 : Cyber security solutions



https://docs.google.com/presentation/d/1w7tkSNOC0-FZSTIVcUUXmLym5cfXxRaHRubb07rAQvA/preview
It's OK because we have solutions! In this section, we look carefully at how to protect computer systems from network vulnerabilities.

We are learning ...
  • How to protect computer systems from network vulnerabilities
So that we can ...
  • Describe methods of identifying vulnerabilities
    - penetration testing (pen testing)
    - ethical hacking
    - commercial analysis tools
    - reviewing networking and user policies
  • Describe machine and network security methods and how they work
    - automatic software update / patches
    - authentication
    - encryption / passwords
    - firewall (hardware and software)
    - proxy servers
    - MAC address filtering
    - Secure Socket Layers (SSL) and Transport Layer Security (TLS)
    - symmetric encryption methods
    - anti-malware software
    - network policies
    - physical security
  • Describe applications of network security methods in the real world
    - online shopping
    - banking

CGP The Revision Guide Page 23
CGP Exam Practice Workbook Page 27


https://docs.google.com/document/d/1ZPDUHh1biKNQVJfhcXnig9MdHAgBF0NztsHi3R6sxQo/export?format=pdf
Click to download revision cards
Remember to print them single sided!