Unit 11 Cyber Security and Incident Management
BTEC Information Technology
Learning Aim A
Cyber Security Threats
What matters more for security: proving who you are, or controlling what you can do?
Start Here: 1 Video Explainer
Understand how authentication and access controls are used to secure systems
Resource 1: Authentication and Access Control Video Explainer, Produced by NotebookLM (Length 6:56)
2 Key Knowledge Points
Connect main ideas and concepts
Resource 2: Authentication and Access Control Infographic by NotebookLM
3 Knowledge Questions
Task: Complete Topic 8 in Workbook 1 - use the slide deck below to help you.