Page 46 - Computer Software Application TP - Volume 1
P. 46
COMPUTER SOFTWARE APPLICATION - CITS
TASK 4: Keep Software and Systems Updated
1 Update operating systems and applications regularly: Apply software updates promptly to patch known
vulnerabilities and security holes.
2 Disable unused software and services: Remove unnecessary software and services to reduce potential
attack vectors.
TASK 5: Monitor Network Activity and Security Events
1 Implement a Security Information and Event Management (SIEM) system: SIEM tools provide centralized
logs and real-time monitoring of security events across your network, helping you detect and respond to
threats promptly.
2 Regularly review security logs: Monitor logs for suspicious activity like failed login attempts, unauthorized
access attempts, and malware signatures.
TASK 6: Conduct Regular Security Assessments and Penetration Testing
1 Schedule regular vulnerability scans: Employ vulnerability scanners to identify weaknesses in your network
infrastructure and applications.
2 Perform penetration testing: Engage professional penetration testers to simulate real-world attacks and
identify exploitable vulnerabilities.
3 Address identified vulnerabilities: Prioritize and address identified vulnerabilities based on their severity
and potential impact.
31
CITS : IT&ITES - Computer Software Application - Exercise 9