As you have learned during this course, there are multiple ways available to secure and protect data. Many companies offer a variety of firewalls, virus detection, and education for example. However, a lot of the security depends on us, how we take advantage of security tools, and most of all, what we click on the internet.
Companies implement cybersecurity countermeasures to detect, prevent, reduce, and counteract when security threats are found. The controls adapt all the time to be able to face the evolving cyber environment. Due to the fast growth of cyberattacks, it's has come even more important to have up-to-date security controls.
Both control types and control functions can be divided into three different categories that overlap each other. Control types are what organizations define as possible models to classify as how to approach security. Control functions, such as corrective, are safeguards and actions on how to control security.
Tässä kohtaa Tick the Box -komponentti, jonka kohdat alla
IDS = Intrusion detection system. IDS monitors networks for malicious activities and violations. If anything suspicious is detected, IDS will send an alarm to the system's operator.
IPS = Intrusion prevention systems. A form of network security to detect and prevent suspicious threats. IPS commonly is right behind the firewall and will take automated actions if something is detected on the traffic through the network.
Tässä kohtaa Multiple Choices -tehtäväkomponentti
Tässä kohtaa Fill in the Blank -tehtäväkomponentti
Tässä kohtaa Three Column Grid -kuvakomponentti, jonka kolme kuvaa alla
As the internet has become accessible for more and more people, the need for security from cyberattacks has increased rapidly. Firewalls are the first line of the defense. They monitor the traffic in the network and stop incoming attacks from viruses. Firewalls also stand in guard to prevent any hacking attempts.
Antivirus software's goal is to prevent, scan, detect, and destroy viruses. Antivirus acts independently in the background and will alert the user if something has been detected.
Tässä kohtaa Matching-tehtäväkomponentti
As the Encryption-lesson taught, encryption basically scrambles the data, and only authorized people can access it. Encrypting data aims to keep our sensitive information private and prevent its manipulation.
Encrypting can be divided into two categories: symmetrical encryption and asymmetrical encryption.
Tässä kohtaa Table, jonka tiedot alla
You got to practice encryption on a small scale in the Encrypting Exercises-lesson. The internet has multiple different kinds of encryption tools, some are commercial and some are free to use.