Lesson 1 Hardware, Software and Operating System Security

2. Cybersecurity Protection and Response

Learning Objectives

Tools

Lesson 1 Hardware, Software and Operating System Security

Hardware, Software and Operating System Security

Hardware Security

Lesson 1 Hardware, Software and Operating System Security

• Hardware security keys:

Operating System Security

Lesson 1 Hardware, Software and Operating System Security

Security practices for protecting operating systems:

Software Security

Lesson 1 Hardware, Software and Operating System Security

• Malware:

Lesson 1 Hardware, Software and Operating System Security

The threats and the best practices described above for hardware,

Lesson 1 Hardware, Software and Operating System Security

Secure System Design Techniques

Security by Design

Defense in Depth

Lesson 1 Hardware, Software and Operating System Security

Secure Programming

Passkeys and Device Security

Lesson 1 Hardware, Software and Operating System Security

The Windows Firewall

Lesson 1 Hardware, Software and Operating System Security

Figure 2.2: Activating the Windows Firewall

Lesson 1 Hardware, Software and Operating System Security

Allowing Internet Access to Applications on your PC

Lesson 1 Hardware, Software and Operating System Security

Modifying File and Folder Permissions on your PC

Lesson 1 Hardware, Software and Operating System Security

Figure 2.4: Modifying file and folder permissions for a specific user

Lesson 1 Hardware, Software and Operating System Security

Read the sentences and tick True or False.

Lesson 1 Hardware, Software and Operating System Security

Evaluate the risks associated with outdated or unsupported hardware components.

Compare the challenges faced in ensuring the security of hardware and software systems.

Analyze the main best practices for protecting operating systems.

Lesson 1 Hardware, Software and Operating System Security

Evaluate the effectiveness of secure system design techniques for protecting digital systems.

List examples of the applications of security by design.

Describe how passkeys are used as a modern authentication method.