Noel's digital portfolio

Unit 22: Computer Security in Practice
In this unit, you will:
A. understand the common security threats and vulnerabilities that affect computers and technology systems and common security protection measures
B. plan security measures to protect a technology system
C. implement security measures to protect a technology system
D. review the finished security measures taken to protect a technology system

Computer Security in Practice unit summary
-
Introduction to Computer Security:
-
Definition: Computer security involves protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
-
Importance: Safeguarding sensitive information, ensuring system integrity, and maintaining user privacy.
-
-
Types of Security Threats:
-
Malware: Viruses, worms, trojans, ransomware.
-
Cyberattacks: DDoS attacks, phishing, social engineering.
-
Insider Threats: Unauthorized access from within an organization.
-
-
Network Security:
-
Firewalls: Filtering and monitoring network traffic.
-
Intrusion Detection and Prevention Systems (IDPS).
-
Virtual Private Networks (VPNs) for secure communication.
-
-
Authentication and Authorization:
-
Password Policies: Strong password requirements.
-
Multi-Factor Authentication (MFA): Enhancing login security.
-
Role-Based Access Control (RBAC) for proper authorization.
-
-
Cryptography:
-
Encryption and Decryption: Securing data in transit and at rest.
-
Public-key cryptography and symmetric-key cryptography.
-
Digital Signatures and Certificates.
-
-
Security Policies and Procedures:
-
Developing and implementing security policies.
-
Incident Response Plans: Responding to security incidents.
-
User Training: Educating users on security best practices.
-
-
Security Assessment and Auditing:
-
Vulnerability Assessments: Identifying and mitigating weaknesses.
-
Penetration Testing: Simulating cyberattacks to test defenses.
-
Security Audits: Evaluating compliance with security policies.
-
-
Secure Software Development:
-
Writing secure code and avoiding common vulnerabilities.
-
Secure coding practices and code review.
-
Integration of security into the software development life cycle.
-
-
Wireless Network Security:
-
Securing Wi-Fi networks.
-
WPA3 encryption, MAC filtering, and disabling unnecessary services.
-
Bluetooth and IoT device security considerations.
-
-
Cloud Security:
-
Securing data and applications in cloud environments.
-
Shared Responsibility Model with cloud service providers.
-
Identity and Access Management in the cloud.
-
-
Security for Mobile Devices:
-
Mobile Device Management (MDM) for secure device configuration.
-
Application Security: Securing mobile apps.
-
Remote wipe and tracking features for lost or stolen devices.
-
-
Legal and Ethical Aspects:
-
Compliance with data protection laws (e.g., GDPR, HIPAA).
-
Ethical considerations in cybersecurity practices.
-
Reporting security incidents and breaches.
-
-
Emerging Trends in Computer Security:
-
Artificial Intelligence for threat detection.
-
Blockchain for secure transactions.
-
Adaptive security measures in response to evolving threats.
-
In summary, the "Computer Security in Practice" unit provides students with practical knowledge and skills to protect computer systems and networks from a variety of security threats. From foundational principles to emerging trends, the unit addresses the dynamic landscape of computer security in practical and applicable ways.