Skip to content
Skip to main content

About this free course

Download this course

Share this free course

Introduction to cyber security: stay safe online
Introduction to cyber security: stay safe online

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

2.3 Protecting your information assets

Described image
Figure 11

Now you’ve done a risk analysis, it’s time to look at how we can better protect our information assets.

You’ve already thought about backing up data and using encryption to protect information – but have you put any of these measures into practice?

Go back to the list of information assets you used in your risk analysis. What steps have you taken to protect them? Think in terms of what you have studied on this course. For example:

  • Have you set up firewalls to protect your networked computers from external attack?
  • Are you protected by up to date antivirus software?
  • Are your operating system and key applications up to date?
  • Is important information protected by encryption?

Note, next to each item on your list, the measure you have taken to protect it. If you have not yet implemented that measure, identify it in some way that will remind you to action it.

In the next section, you are invited to create a plan for implementing and maintaining your information security.