Noel's digital portfolio

Unit 22: Computer Security in Practice
In this unit, you will:
A. understand the common security threats and vulnerabilities that affect computers and technology systems and common security protection measures
B. plan security measures to protect a technology system
C. implement security measures to protect a technology system
D. review the finished security measures taken to protect a technology system

Computer Security in Practice unit summary
- 
Introduction to Computer Security:
- 
Definition: Computer security involves protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
 - 
Importance: Safeguarding sensitive information, ensuring system integrity, and maintaining user privacy.
 
 - 
 - 
Types of Security Threats:
- 
Malware: Viruses, worms, trojans, ransomware.
 - 
Cyberattacks: DDoS attacks, phishing, social engineering.
 - 
Insider Threats: Unauthorized access from within an organization.
 
 - 
 - 
Network Security:
- 
Firewalls: Filtering and monitoring network traffic.
 - 
Intrusion Detection and Prevention Systems (IDPS).
 - 
Virtual Private Networks (VPNs) for secure communication.
 
 - 
 - 
Authentication and Authorization:
- 
Password Policies: Strong password requirements.
 - 
Multi-Factor Authentication (MFA): Enhancing login security.
 - 
Role-Based Access Control (RBAC) for proper authorization.
 
 - 
 - 
Cryptography:
- 
Encryption and Decryption: Securing data in transit and at rest.
 - 
Public-key cryptography and symmetric-key cryptography.
 - 
Digital Signatures and Certificates.
 
 - 
 - 
Security Policies and Procedures:
- 
Developing and implementing security policies.
 - 
Incident Response Plans: Responding to security incidents.
 - 
User Training: Educating users on security best practices.
 
 - 
 - 
Security Assessment and Auditing:
- 
Vulnerability Assessments: Identifying and mitigating weaknesses.
 - 
Penetration Testing: Simulating cyberattacks to test defenses.
 - 
Security Audits: Evaluating compliance with security policies.
 
 - 
 - 
Secure Software Development:
- 
Writing secure code and avoiding common vulnerabilities.
 - 
Secure coding practices and code review.
 - 
Integration of security into the software development life cycle.
 
 - 
 - 
Wireless Network Security:
- 
Securing Wi-Fi networks.
 - 
WPA3 encryption, MAC filtering, and disabling unnecessary services.
 - 
Bluetooth and IoT device security considerations.
 
 - 
 - 
Cloud Security:
- 
Securing data and applications in cloud environments.
 - 
Shared Responsibility Model with cloud service providers.
 - 
Identity and Access Management in the cloud.
 
 - 
 - 
Security for Mobile Devices:
- 
Mobile Device Management (MDM) for secure device configuration.
 - 
Application Security: Securing mobile apps.
 - 
Remote wipe and tracking features for lost or stolen devices.
 
 - 
 - 
Legal and Ethical Aspects:
- 
Compliance with data protection laws (e.g., GDPR, HIPAA).
 - 
Ethical considerations in cybersecurity practices.
 - 
Reporting security incidents and breaches.
 
 - 
 - 
Emerging Trends in Computer Security:
- 
Artificial Intelligence for threat detection.
 - 
Blockchain for secure transactions.
 - 
Adaptive security measures in response to evolving threats.
 
 - 
 
In summary, the "Computer Security in Practice" unit provides students with practical knowledge and skills to protect computer systems and networks from a variety of security threats. From foundational principles to emerging trends, the unit addresses the dynamic landscape of computer security in practical and applicable ways.