2. Cybersecurity Protection and Response
Learning Objectives
Tools
Hardware, Software and Operating System Security
Hardware Security
• Hardware security keys:
Operating System Security
Security practices for protecting operating systems:
Software Security
The threats and the best practices described above for hardware,
Secure System Design Techniques
Security by Design
Defense in Depth
Secure Programming
Passkeys and Device Security
Figure 2.2: Activating the Windows Firewall
Allowing Internet Access to Applications on your PC
Modifying File and Folder Permissions on your PC
Figure 2.4: Modifying file and folder permissions for a specific user
Read the sentences and tick True or False.
Evaluate the risks associated with outdated or unsupported hardware components.
Compare the challenges faced in ensuring the security of hardware and software systems.
Analyze the main best practices for protecting operating systems.
Evaluate the effectiveness of secure system design techniques for protecting digital systems.
List examples of the applications of security by design.
Describe how passkeys are used as a modern authentication method.