Order this Assignment Now: £129 VALID THRU: 24-Dec-2024
Assignment Briefs
11-28-2024
1.1 Describe the concepts of cyber security
NCFE Level 3 Certificate in Cyber Security Practices
Unit 1 Understand cyber security principles
Table of Contents
Learner Declaration.................................................................................................................. 2
Learning outcome 1: Understand cyber security..................................................................... 3
1.1 Describe the concepts of cyber security.............................................................................. 4
1.2 Explain the importance of cyber security............................................................................. 4
1.3 Describe the consequences and implications of inadequate cyber security......................... 5
Learning Outcome 2: Understand core terminology and key aspects of cyber security....... 5
2.1 Define core terminology used in cyber security................................................................... 6
2.2 Explain the terms good actors and bad actors...................................................................... 6
2.3 Distinguish typical behaviours of good actors and bad actors............................................... 7
2.4 Explain the motivations of good actors and bad actors......................................................... 7
2.5 Identify key sectors that are most vulnerable to a cyber-attack........................................... 7
2.6 Compare the motivations for a cyber-attack in key sectors.................................................. 8
2.7 Consider how an actor may carry out a cyber-attack............................................................. 8
Learning Outcome 3: Understand security by design principles............................................. 8
3.1 Describe the term security by design.................................................................................. 9
3.2 Explore the principles of security by design........................................................................ 9
3.3 State the consequences of not considering cyber security during the design phase............. 9
3.4 Evaluate the advantages and disadvantages of security by design....................................... 9
Learner Declaration
Declaration:
I certify that the work submitted for this internal synoptic project is my own. I have clearly referenced any sources used in the work. I understand that false declaration is a form of malpractice
Learner signature:
Date:
Learning outcome 1: Understand cyber security
1.1 Describe the concepts of cyber security
Describe the concepts of cyber security
Security
Identity
Confidentiality
Integrity
Availability
Threat
Vulnerability
Risk
Hazard
1.2 Explain the importance of cyber security
Explain the importance of cyber security
1.3 Describe the consequences and implications of inadequate cyber security
Describe the consequences and implications of inadequate cyber security
Sensitive Data
Personally Identifiable Information (PII)
Protected Health Information (PHI)
Personal Information
Intellectual Property
Industry Information Systems
Learning Outcome 2: Understand core terminology and key aspects of cyber security
2.1 Define core terminology used in cyber security
Define core terminology used in cyber security Explain the terms good actors and bad actors
Malicious Software
Distributed Denial of Service (DDOS)
Cloud
Software
Domain
Exploit
Breach
Firewall
Encryption
Bring Your Own Device (BYOD)
Penetration Testing (Pen testing)
2.2 Explain the terms good actors and bad actors
Explain the terms good actors and bad actors
Bad actors (MUST include, but not limited to: Black Hats, Script Kiddies, Hacktivists and Ex Employees)
Good actors (MUST include but not limited to: Certified Penetration Testers, Ethical Hackers, White Hats
2.3 Distinguish typical behaviours of good actors and bad actors
Distinguish typical behaviours of good actors and bad actors
2.4 Explain the motivations of good actors and bad actors
Explain the motivations of good actors and bad actors
Bad actors (MUST include but not limited to: – financial gain, terrorism, political motivation, reputation, disruption, respect, thrill seeking)
Good actors (MUST include but not limited to: Ethical, job role, improve things, innovation, challenge of being better than a black hat.
2.5 Identify key sectors that are most vulnerable to a cyber-attack
Health
Manufacturing
Finance
Government Agencies and Departments
Educational Institutions
2.6 Compare the motivations for a cyber-attack in key sectors
2.7 Consider how an actor may carry out a cyber-attack
Consider how an actor may carry out a cyber-attack – state the type of attack and how it can be carried out by the actor
You MUST state the type of attack
Learning Outcome 3: Understand security by design principles
3.1 Describe the term security by design
Describe the term security by design
3.2 Explore the principles of security by design
Explore the principles of security by design
3.3 State the consequences of not considering cyber security during the design phase
State the consequences of not considering cyber security during the design phase
Evaluate the advantages and disadvantages of security by design
Sample Answer - Plagiarised, Order Custom Written Assignment
Understanding Cyber Security Concepts
Cyber security refers to the practice of protecting computer systems, networks, data, and programs from unauthorised access, damage, or disruption. The following key concepts underpin the framework of cyber security:
Security
Security in cyber contexts involves safeguarding information and systems to ensure they are accessible only to authorised individuals or entities. This encompasses protective measures to deter threats and maintain a trusted environment for operations.
Identity
Identity pertains to verifying and establishing the legitimacy of an individual or entity accessing systems or data. This process often involves authentication methods such as passwords, biometrics, or multi-factor verification, ensuring that access is granted only to those with proper credentials.
Confidentiality
Confidentiality ensures that sensitive information is accessible only to authorised users, safeguarding it from unauthorised disclosure. It is often achieved through encryption, access controls, and policies that limit information sharing.
Integrity
Integrity focuses on maintaining the accuracy, consistency, and reliability of data throughout its lifecycle. Mechanisms such as checksums and hashing are employed to detect and prevent unauthorised alterations or corruption of information.
Availability
Availability ensures that systems, applications, and data are accessible when needed, often requiring robust infrastructure, regular maintenance, and disaster recovery plans to minimise downtime and service disruptions.
Threat
A threat refers to any potential event, actor, or circumstance that could exploit vulnerabilities in a system to cause harm, such as hacking attempts, malware, or phishing attacks.
Vulnerability
A vulnerability is a weakness or flaw within a system, network, or software that can be exploited by threats to compromise security. Regular updates and patches are essential to address these weaknesses.
Risk
Risk is the probability and potential impact of a threat exploiting a vulnerability. Effective risk management involves assessing, prioritising, and implementing measures to mitigate risks to acceptable levels.
Hazard
A hazard in cyber security represents a potential source of danger that could lead to harm, such as poorly configured systems, outdated software, or untrained personnel. Hazards often serve as precursors to vulnerabilities or risks.
Continued...
Order this Assignment Now:£129
100% Plagiarism Free & Custom Written, Tailored to your instructions