will learn to describe how to protect systems against
malware and cyber attacks. We spoke about malware and the things that they do. Now let's talk a little bit of how do we protect against them. How can we protect as we have technical controls. Technical controls are the hardware or software that aid into protect any information which may include antivirus, which is kind of files for executable code and much of signatures that are known viruses. We also have inter-operation systems, internal detection systems, and unified threat management systems. Those are systems that can look for and texting interesting progress when we get to compromise on the environment. Each implementation is unique and it depends on the organization security needs. Then we have updates. With all the software deployed, we need to stay up to-date to prevent creating new holes into our security. This is done by applying the security patches. Then we have operational controls also known as administratively controls. They are put in place by management and depends on the stuff on complying in order to be effective. One of these controls are policies. So policies, it's a written document issued by an organization to ensure that all its users comply with the rules and guidelines related to security. An example could be a password policy, which the enterprise requires a minimum of 15 characters with the list one is efficiency more. Then we have trainings. Training is to make sure that users of the organization are aware of its policies or threats out there. An example could be a switch engineering training. How it shows the user. It shows the user how to deal with the social engineering attacks. Lastly we have revision and tracking. Revision and tracking, it means ensuring that the items that we just mentioned they stay up to date.