Understand security protection and risk management issues.
AC 1.1:
Internal threats to systems and data may arise from the actions of employees or by an authorised user.
Accidental threats:
- Accidental damage to physical equipment caused by employee/user
- Accidental loss of data/power, unintentional disclosure of data, authorised user action
- Physical damage, destruction by fire, flood or other disaster
- Risk of bring your own device (BYOD)
- Unsafe practices
- The use of external storage devices/media
- Visiting untrusted websites
- Downloading/uploading files to/from the internet
- File-sharing applications.
Malicious threats:
- Malicious damage caused by employee/unauthorised user action
- Intentional deletion/editing of data and intentional disclosure of data
- Dumpster diving and shoulder surfing
- Theft of equipment or data
- Malicious damage to equipment or data
- Unauthorised access by employees to secure areas in a building
- Unauthorised access to administration functions, security levels and protocols, users overriding security controls
- Risk of BYOD.
External threats to systems and data may arise when the internet is used to access IT systems and data, or as a result of the actions of unauthorised people, malicious software, theft or physical damage.
Malicious software (malware) used to obtain secure information, viruses, worms, Trojans, ransomware, spyware, adware, rootkits, backdoors, botnets, zero-day attacks.
Unauthorised access by individuals, commercial organisations or governments.
Social engineering used to obtain secure information by deception, to include collection of passwords, data theft, scams, phishing, pharming,dumpster diving and shoulder surfing.
Damage or destruction by fire.
Malicious damage to equipment or data.
Evolving threats:
- New threats that are constantly being developed/existing threats that evolve over time.
- Importance of organisations/users applying regular updates either automatically or manually.
- Support and information is available for organisations/users on known hardware and software vulnerabilities from manufacturers’ help facilities, user forums, FAQs, online tutorials.
AC 1.2:
Vulnerabilities:
- Types of system: individual devices, including PCs, laptops, mobile devices, portable storage devices, networks, including local area network
- (LAN), wireless local area network (WLAN), file servers, cloud computing systems, online storage, remote server, online software.
- Connection between systems: connection to the internet, connection to internal networks.
- Connection methods: wired/wireless (Wi-Fi, Bluetooth, cellular)
- Interactions between devices: use of storage devices.
- Operating systems: unsupported versions, updates not installed, mobile devices’ reliance on original equipment manufacturers (OEM) to update system software, legacy systems.
- Software: zero-day vulnerability, downloads, untrusted sources, illegal copies.
- Users: limitations of understanding.
Assessment Criteria
-
1.1
Describe the types of threat to IT systems and data.
-
1.2
Explain the factors that affect the vulnerability of IT systems and data.