Evaluate the practices necessary to mitigate cybersecurity threats.

Evaluation should include

  • strong passwords
  • multi-factor authentication
  • software updates
  • regular employee training
  • asset management
  • firewalls
  • computer security
  • network security (e.g., role based, audit)
  • contracts agreement
  • data security (e.g., encryption at rest, encryption in transit)
  • data back up
  • segregated networks
  • log files analysis
  • risk analysis
  • incident response.

Teacher Resource:

National Security Agency Cybersecurity Information Links to an external site.

Process/Skill Questions:

  • Why is it important to build in an incident response plan?
  • Why are firewalls important in mitigating cybersecurity threats?
  • How does enabling multi-factor authentication assist with mitigating cybersecurity threats?