Академический Документы
Профессиональный Документы
Культура Документы
CSCU V2 vs. V1
Version Change Document
Legend:
Purple colour: Newly added
Green: Partially added
Struck out - Not included in CSCUv2
Potential Losses Due to Security Attacks Potential Losses Due to Security Attacks
Financial Loss
Unavailability of Resources
Identity Theft
Loss of Trust
Data Loss/Theft
Precaution Precaution
Maintenance Maintenance
Reaction Reaction
Module 02: Securing Operating Systems Module 02: Securing Operating Systems
System Security
How to Hide Files and Folders? How To Hide Files and Folder
Raise the UAC Slider Bar in Windows 7 Raise The UAC Slide Bar
Module 03: Protecting System Using Module 03: Malware and Antivirus
Antiviruses
What is Malware
Types Of Malware
Virus
Trojan
Worm
Spyware
Ransomware
Rootkit
Slow System
Pop Ups
System Crashes
Antivirus Disabling
Antivirus
Avast Antivirus
EICAR Test
What is Encryption?
Objectives of Encryption
Usage of Encryption
Types of Encryption (This topic is covered
in Mod 6 in V2) This Module is not included in
Symmetric vs. Asymmetric Encryption CSCUv2.
Encryption Standards
Digital Certificates
Digital Signature
Cryptography Tools
Microsoft Edge
Understanding IM Security
Social Engineering
Protection Schemes, Cyber Prostitution,
and Virtual Mugging
How the Malicious Users Make Money?
Clickjacking
Social Engineering
Geotagging
Account Settings
Security Settings
Privacy Settings
Password Settings
Email Notifications
App Settings
Introduction to Email
Email Clients
Key Considerations While Choosing an
Email Client
Email Service Providers
Email Message
Scam Emails
Spamming Countermeasures
Understanding Various Email Security
Email Security Procedures
Procedures
Creating Strong Passwords Create and Use Strong Passwords
Disable/unselect the Keep Me Signed Disable Keep Me Signed In/Stay Signed
In/Remember Me functions. In Functions
Provide Recovery Email Address for
Alternate Email Address
Mail Recovery
Use HTTPS Enabled Email Service
Using HTTPS
Provider
Turn Off Preview Feature Turn Off the Preview Feature
Email Filtering: Avoiding Unwanted
Avoid Unwanted Emails Using Filters
Emails
Scanning Email Attachments Scan Email Attachments for Malware
Check for Last Account Activity Check for Last Account Activity
Module 13: Securing Mobile Devices Module 07: Securing Mobile Devices
Understanding Mobile Device Security
Concepts
Mobile Phone Services Securing Mobile Devices
Cloud Services
Benefits of Cloud
Threats To Cloud Security
Data Breach
Data Loss
Account Hacking
Disgruntled Insider
Technology Loopholes
Shared Space
Safeguarding Against Cloud Security
Threats
Back Up Data
Encrypt
Data Ownership
Data Location
Data Migration
Data Permanency
Encrypt
Module 07: Securing Network Connections Module 09: Securing Network Connections
Understanding Various Networking
Concepts
Types of networks
Recognize the options for connecting
to a network like: cable, wireless.
Home Network Home Network
Network Devices
Transferring Files
Module 05: Data Backup and Disaster Module 10: Data Backup and Disaster
Recovery Recovery
Data Backup Concepts
What Files to Backup and How Often? What Files to Backup and How Often
Full Backup
Incremental Backup
Differential Backup
Back Up the Data Using Windows Backup Windows Backup and Restore Procedures
Securing Backup on Storage Devices with MAC OS X Backup and Restore Procedures
Encryption
Time Machine (Apple Software) Time Machine (Apple Software)
VirtualLab
Physical Security
Physical Security Measures: Locks
o Rating Icons
Social Engineering
Computer-Based Social
Engineering: Phishing
Phony Security Alerts
o econsumer.gov
Compliance
This module is not included in
HIPPA CSCUv2.
o HIPPA Checklist
FERPA
o FERPA Checklist
PCI DSS