Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

2.3 Protecting your information assets

This section is part of the amber and green pathways.

This photograph shows a young woman sitting on the floor with her laptop.
Figure 11

Now you’ve done a risk analysis, it’s time to look at how we can better protect our information assets.

You’ve already thought about backing up data and using encryption to protect information – but have you put any of these measures into practice?

Go back to the list of information assets you used in your risk analysis. What steps have you taken to protect them? Think in terms of what you have studied on this course. For example:

  • Have you set up firewalls to protect your networked computers from external attack?
  • Are you protected by up to date antivirus software?
  • Are your operating system and key applications up to date?
  • Is important information protected by encryption?

Note, next to each item on your list, the measure you have taken to protect it. If you have not yet implemented that measure, identify it in some way that will remind you to action it.

In the next section, you are invited to create a plan for implementing and maintaining your information security.