Topic 3 Part 1
Topic 3 Part 1
0
Countermeasure
in Cybersecurity
DFC20313 Cybersecurity Fundamentals
Prepared By: Fatimah Zahra
Part 1
CLO & PLO
Upon completion of this course, students should be able
to:
CLO1
Explain cybersecurity threats and hazard using
appropriate tools and techniques for secured
environment in organizations
Content c.Network
d.Physical
3.2
3.2 Examine common types of infrastructure security.
Application This ensures that applications are secure from threats like SQL
Security 3 injections and unauthorized access. It involves hardening
applications and protecting databases
COMMON TYPES OF
INFRASTRUCTURE SECURITY
Data This involves protecting data wherever it is stored, using
Security 4 encryption, backups, and anonymization techniques
These layers of security work together to create a robust defense against various
threats, ensuring the resilience and integrity of an organization’s infrastructure.
CLASSIFICATION OF
INFRASTRUCTURE
SECURITY
Classification of infrastructure
security
Devic
01
es
02 Media
03
Security
topologies
04
Intrusion
detection
Security
05
baseline
Application
06
hardening
01 Devices
breach.
• There are two main types:
i. Network-based IDS (NIDS)
ii. Host-based IDS (HIDS)
INFRASTRUCTURE COMPONENTS
Honeypots
Honeypots are decoy systems or networks designed to attract cyber
attackers. They mimic real systems to lure attackers away from actual
targets and gather information about their methods and tools. This
COMMON SECURITY