This unit explores the areas of growing threats in ICT. Learners will understand why security is necessary, the potential dangers, and how to protect systems and data. This module develops in-depth knowledge and understanding of the types of threat to ICT systems and data and methods of protecting against them including the applications of cryptography.
The learner will:
1.Understand the common types of threat to ICT systems and data such as hardware damage, loss and theft, electronic threats such as denial of service, data theft or damage, unauthorised use.
2.Manage the security vulnerabilities associated with remote access technologies.
3.Methods to protect ICT systems; physical access control and security, electronic access control and security for ICT systems using firewalls, virtual networks, secure connection/transfer protocols, secure wireless connection)
Understand the applications of cryptography to ICT systems and cryptographic algorithms.