In this unit, you will understand the importance of information security management and the mitigation controls used to protect organisational data. You will be able to use a security information and event management (SIEM) software and understand how to establish whether a vulnerability has been exploited.
Learning outcome 1: Understand the importance of information security management in protecting organisational data
1.1 Identify a range of organisational data that may need to be kept secure
1.2 Describe how to use a data catalogue to identify an organisation’s data source
1.3 Explain the principles of a Data Protection Impact Assessment (DPIA)
1.4 Describe the principles of information security
1.5 Discuss the importance of managing information security within an organisation
1.6 Describe the protocols to control access to information
Learning outcome 2: Understand a range of mitigation controls used to support information security
2.1 Describe the interrelationship between a threat, a vulnerability, weaponisation and an exploit
2.2 Describe a range of digital security threats and vulnerabilities
2.3 Describe the application of a range of mitigation controls
Learning outcome 3: Be able to use security Information and event management (SIEM) software
3.1 Describe the purpose of SIEM software
3.3 Identify different types of data that SIEM captures
3.4 Interpret the output of a SIEM report for an event
Learning outcome 4: Understand how to establish if a vulnerability has been exploited
4.2 Describe the scoring matrix within the CVSS
4.3 Explain the process of risk management
4.4 Investigate a range of remediation techniques
4.5 Identify known weaknesses within a device, network or application, using a vulnerability scan