Evaluate the practices necessary to mitigate cybersecurity threats.
Evaluation should include
- strong passwords
- multi-factor authentication
- software updates
- regular employee training
- asset management
- firewalls
- computer security
- network security (e.g., role based, audit)
- contracts agreement
- data security (e.g., encryption at rest, encryption in transit)
- data back up
- segregated networks
- log files analysis
- risk analysis
- incident response.
Teacher Resource:
National Security Agency Cybersecurity Information Links to an external site.
Process/Skill Questions:
- Why is it important to build in an incident response plan?
- Why are firewalls important in mitigating cybersecurity threats?
- How does enabling multi-factor authentication assist with mitigating cybersecurity threats?