Describe the application of a range of mitigation controls
Pick 2, describe them and give an example like AVG (antivirus)
Assessment
Report
Application, for example:
Â
•     vulnerability management
•     penetration testingÂ
•     controlling accessÂ
•     anti-malware software
•     software updates
•     encryption
•     strong password protection and authentication (for example, 2-factor authentication (2FA))
•     secure Wi-FiÂ
•     disaster recovery and business continuityÂ
•     device hardening
 Â
 Think of these controls as the different safety features and security checks you would put in place if you were trying to protect a super-secret clubhouse.
What it Does: Scans systems to find weak spots (vulnerabilities) and recommends fixes.
Clubhouse Analogy: It's like checking your clubhouse for any loose boards or broken windows that need fixing.
What it Does: Tests security by simulating hacker attacks.
Clubhouse Analogy: Pretending to be a "bad guy" to see if you can break into your own clubhouse. If you can, you know where to strengthen your defenses.
What it Does: Only allows authorized people to access certain information.
Clubhouse Analogy: Only letting in people who know the secret handshake or password.
What it Does: Detects and removes harmful software like viruses.
Clubhouse Analogy: Think of this as a "bug zapper" that gets rid of harmful "bugs" or viruses that might come into your clubhouse.
What it Does: Keeps all software current to fix security gaps.
Clubhouse Analogy: It's like making sure your clubhouse has the latest locks or alarm systems.
What it Does: Scrambles data so only people with the right "key" can read it.
Clubhouse Analogy: Storing your secret clubhouse plans in a code that only members can understand.
What it Does: Makes it harder for unauthorized people to log in.
Clubhouse Analogy: Having a two-step secret handshake. Even if someone guesses the first part, they won't get through without knowing the second part.
What it Does: Protects the wireless network from unauthorized access.
Clubhouse Analogy: Imagine your clubhouse has a private radio channel. Secure Wi-Fi ensures no one can eavesdrop on your conversations.
What it Does: Plans for how to recover data and keep the business running after a disaster.
Clubhouse Analogy: Having an emergency escape plan and a backup clubhouse in case the original one gets ruined.
What it Does: Strips down systems to only essential features, reducing potential points of attack.
Clubhouse Analogy: Taking out any unnecessary doors or windows so there are fewer ways for someone to break in.
Each of these mitigation controls adds an extra layer of security, making it tougher for hackers or other bad actors to cause harm. When used together, they create a pretty solid security strategy for protecting your "clubhouse," or in real terms, your computer network.
Mitigation controls are ways to reduce or manage the risk of bad things happening to a computer system or network. Imagine your computer system as a castle. There are many ways people could try to attack it, like climbing over the walls, digging under them, or even pretending to be someone they're not to get inside. Different mitigation controls are like various defenses you can put in place to protect the castle. Let's look at a range of them:
What it Does: Divides the network into smaller parts so that if attackers get in, they can't easily access everything.
Castle Analogy: It's like having different sections in your castle, each with its own locked door. If an intruder gets into one section, they can't easily get to the others.
What it Does: Blocks unauthorized access to or from a network.
Castle Analogy: Think of a firewall as the castle gate. It decides who can come in and who should stay out.
What it Does: Monitors the network for any suspicious activity and sends out alerts.
Castle Analogy: This would be like having guards who shout a warning if they see someone trying to climb the castle walls.
What it Does: Scans for and removes malicious software like viruses.
Castle Analogy: Imagine this as guards checking people for hidden weapons before they can enter the castle.
What it Does: Turns data into a secret code so that only people with the right 'key' can read it.
Castle Analogy: This is like putting important documents in a safe that only trusted people can open.
What it Does: Requires two steps to log in, usually a password and then a second check like a text message or fingerprint.
Castle Analogy: Imagine having to go through two different locked doors using two different keys to get inside.
What it Does: Keeps software up-to-date to fix security flaws.
Castle Analogy: This is like repairing any cracks in the castle walls to make sure they stay strong.
What it Does: Teaches users how to avoid risks like phishing scams.
Castle Analogy: This is like teaching everyone in the castle how to spot spies or intruders.
What it Does: Makes copies of important data and systems so you can get back on your feet if something bad happens.
Castle Analogy: Imagine having a hidden stash of food and supplies in case of a siege.
What it Does: Keeps an eye on what's happening in the network and reviews logs and activities.
Castle Analogy: This is like guards regularly checking every corner of the castle and reporting back on any unusual activities.
Each mitigation control helps in its own way, and using them together gives you the best chance at keeping your "castle" safe and secure.