U
NIT
11:
C
YBER
S
ECURITY AND
I
NCIDENT
M
ANAGEMENT
Pearson BTEC International Level 3 Qualifications in Information Technology –
Specification – Issue 3 – September 2022 © Pearson Education Limited 2022
157
o
user authentication
–
user login procedures
–
strong password
–
text
and graphical password
–
biometric authentication
–
two-step verification
–
security tokens, including USB-based and near field keys
–
knowledge-based authentication, including question
and response pairs
–
Kerberos network authentication for Windows
®
and Linux
®
-based
operating
systems
–
certificate-based authentication
o
access controls and the methods to restrict users’ access to resources, including
applications, folders, files and physical
resources
o
trusted computing.
•
Purpose and uses of encryption, including:
o
safe password storage
o
digital rights management (DRM)
o
file, folder, disc encryption
o
communications encryption
–
built
into devices, including smartphones and tablets
–
The Onion Router (Tor)
–
virtual private networks (VPNs)
–
digital certificates and certificate authorities
–
Hypertext Transfer Protocol Secure (HTTPS)
–
public/private keys.
•
Precautions that can be taken to protect a wireless local area network (WLAN)
from unauthorised access, including:
o
MAC address filtering and hiding the service set identifier (SSID)
o
wireless encryption – Wired Equivalent Privacy (WEP), Wi-Fi Protected Access 2
(WPA2) and Wi-Fi Protected Setup (WPS), mitigating known wireless
vulnerabilities
o
consideration of security issues during network and system design to ensure
security is built-in from the development stage.
Dostları ilə paylaş: