1.4.2

Identifying and Preventing Vulnerabilities

Security is strongest when different protection methods work together. You need to know how prevention methods reduce vulnerabilities, what each one does, and when each method is most useful in a real scenario.

20 exam questions 7 flashcards

What you need to know

  • Explain how each prevention method reduces threats.
  • Link a prevention method to the attack it helps stop or limit.
  • Understand why layered security is stronger than relying on one control.
  • Choose the most suitable prevention method for a scenario.

Big Picture

Why security needs layers

No single security method can stop every threat, so organisations use several methods together.

For example, a firewall may block suspicious traffic, passwords may protect accounts, and encryption may protect data if it is intercepted. This layered approach reduces risk much more effectively.

Exam phrase

A strong answer often explains not just what the protection is, but which threat it helps reduce.

Preventive Checks

Penetration testing, anti-malware, and firewalls

These methods are used to spot problems early and reduce the chance of an attack succeeding.

MethodWhat it doesWhat it helps prevent
Penetration testingTests the system for weaknessesHelps identify vulnerabilities before attackers do
Anti-malware softwareDetects, blocks, and removes malicious softwareHelps prevent malware infections
FirewallFilters incoming and outgoing network trafficHelps block unauthorised access and suspicious traffic

Accounts

Passwords and user access levels

Good account security reduces the chance of unauthorised access.

  • Strong passwords are harder to guess or brute-force.
  • User access levels make sure people only have access to the data and tools they need.
  • Restricting permissions helps reduce accidental damage as well as deliberate misuse.

Useful distinction

Passwords help confirm who the user is. Access levels decide what that user is allowed to do.

Protecting Data and Devices

Encryption and physical security

Some threats target the data itself, while others target the hardware.

Encryption helps protect data by making it unreadable without the correct key. This is useful for stored files and data travelling across networks.

Physical security includes locks, swipe cards, CCTV, and keeping devices in secure locations. It helps stop unauthorised people reaching the hardware directly.

  • Encryption helps protect confidentiality.
  • Physical security reduces theft or tampering.
  • Good security combines digital and physical protection.

Key takeaways

  • Prevention methods work best in layers rather than on their own.
  • Penetration testing helps find weaknesses before real attackers do.
  • Firewalls, anti-malware, passwords, and access levels all protect different parts of the system.
  • Encryption protects data, and physical security protects the hardware itself.

Glossary

Vulnerability
A weakness in a system that could be exploited.
Penetration testing
Testing a system to find security weaknesses.
Firewall
Software or hardware that filters network traffic using security rules.
Access level
The permissions a user has within a system.
Physical security
Methods used to protect hardware from theft, damage, or unauthorised access.

Test yourself

Common questions