Analysis of Log Files: The process of reviewing and interpreting system logs to identify, investigate, and respond to security incidents or suspicious activities.
Anti-malware: Software designed to detect, prevent, and remove malicious software, including viruses, ransomware, and spyware.
Firewall Filtering: A security mechanism that controls incoming and outgoing network traffic based on predetermined security rules, allowing or blocking data packets.
Access Control Lists (ACLs): A set of rules that define which users or systems can access certain resources on a network, and what actions they can perform.
Intrusion Prevention Systems (IPS): Network security tools that monitor and analyse traffic to detect and prevent malicious activities in real-time.
Virtual Private Networks (VPNs): Secure connections over the internet that encrypt data, allowing users to safely access a private network remotely.
User Training: Education and awareness programs designed to teach users how to recognise and avoid security threats, such as phishing or social engineering attacks.
ICT Code of Conduct: A set of guidelines and best practices for responsible and ethical use of information and communication technology (ICT) within an organisation.
Physical Security: The protection of hardware, software, networks, and data from physical threats like theft, damage, or unauthorised access through measures such as locks, surveillance, and secure facilities.