Definitions
Tools & Methods
Key Factors Affecting Security Decisions
Real-World Examples

100

This is the practice of protecting a network from unauthorized access or attacks.

network security

100

This tool scans your system to detect and remove viruses.

Antivirus software

100

The amount of money available for security tools.

Budget

100

An employee receives an email pretending to be their bank asking for login details.

Phishing

200

A harmful program designed to damage or disrupt systems.

Malware

200

This method scrambles data so only authorised users can read it.

Encryption

200

The size of a network and number of users.

network size/scale

200

A company installs software to block viruses on all computers.

Antivirus protection

300

A method used by attackers to trick users into giving personal information.

Phishing

300

This tool blocks unwanted traffic based on security rules.

Firewall

300

How sensitive or valuable the data is.

data sensitivity

300

A hacker guesses weak passwords to access accounts.

a brute force attack

400

A secret code used to protect data.

Password

400

This method requires users to verify identity in two steps (e.g. password + code).

two-factor authentication (2FA)

400

Rules or laws organisations must follow to protect data.

regulations/compliance

400

A business encrypts customer data to keep it safe.

encryption

500

A system that monitors and controls incoming and outgoing network traffic.

Firewall

500

This tool monitors networks to detect suspicious activity.

intrusion detection system (IDS)

500

The level of risk an organisation is willing to accept.

risk tolerance

500

A major company loses customer data due to a cyber attack.

data breach

M
e
n
u