What is Cyber Security Management
MITRE's ATT&CK
Explain the CIA triangle
What is the Cyber Kill Chain?
What is a threat?
State 3 cyber threats.
What are vulnerabilities?
State 3 vulnerabilities.
How will a strategy help for risk management?
What is a risk assessment?
What does the term likelihood mean?
What does it mean by the impact of a threat?
What is a Qualitative assessment?
What is a Quantitative assessment?
What is a semi-quantitative assessment?
What does the term SWOT analysis mean?
Explain what a risk is.
Stages of the cyber kill chain.
What are the types of mitigation techniques used for countering possible attacks?
What can be done for for explosives and ballistics protection?
CBR defence, explain.
How does lighting affect security?
How could you deal with hostile vehicle mitigation
How could doors be used to protect against intruders?
how can gates help improve physical security?
Stages of the incident response lifecycle.
How will establishing a point of contact help with forensic readiness?
What is a forensic plan?
Explain the term: Chain of Custody.
Tasks of the first responder.
State 2 issues with the DPA
Who does the General Data Protection Regulation apply to?
True or False. Under the GDPR, the data controller does not need consent from the data subject.
True or False. An individual has the right to have all of their data removed.
How long does an organisation have to report a non-compliance incident?
What are the cyber essentials relating to security?
What does the ICO do? State 3 things.
What are IOT devices?
What is an audit trail?
What does it mean by payload?