- ✓A defence-in-depth strategy layers multiple security controls so that if one fails, others continue to provide protection.
- ✓Firewalls filter network traffic based on rules, blocking unauthorised connections while allowing legitimate communication through.
- ✓Encryption protects data both in transit and at rest, ensuring that even if intercepted or stolen, it cannot be read without the decryption key.
- ✓Multi-factor authentication requires users to provide two or more forms of identity verification, significantly reducing the risk of account compromise.
- ✓Intrusion detection and prevention systems monitor network and system activity for signs of malicious behaviour and can respond automatically.
Listen to the full episode inside the course. Enrol to access all 80 episodes, plus assignments, tutor support and Student Finance funding.
Start learning →Alex: Today we're exploring IT security solutions. Sam, once you've identified your risks, what tools and techniques do you use to address them?
Sam: The most important concept to understand first is defence in depth. No single security control is foolproof, so effective security uses multiple overlapping layers. If one control fails or is bypassed, others continue to provide protection. An attacker who defeats your firewall still has to deal with your endpoint security, then your access controls, then your data encryption.
Alex: Let's go through the main controls. Firewalls are usually the first line of defence?
Sam: Traditionally, yes. A firewall inspects network traffic and applies rules to allow or block it based on characteristics like IP address, port, and protocol. A basic packet filtering firewall makes decisions based on these headers alone. A stateful firewall tracks the state of network connections and can make more informed decisions. A next-generation firewall goes further, inspecting the content of traffic, applying application-level rules, and integrating with threat intelligence feeds.
Alex: What about protecting devices themselves?
Sam: Endpoint security covers the devices that connect to your network: laptops, desktops, phones, tablets. Antivirus and antimalware software detects and removes known malicious code. More sophisticated endpoint detection and response tools, EDR, monitor behaviour patterns to detect malicious activity even from previously unknown threats. Mobile device management ensures company devices are configured securely and can be remotely wiped if lost or stolen.
Alex: Encryption seems fundamental too.
Sam: Encryption is one of the most important security controls available. Data in transit should be encrypted using protocols like TLS, which is what HTTPS uses, so that even if network traffic is intercepted it's unreadable without the decryption key. Data at rest, in databases, file systems, and on portable storage, should also be encrypted. If an encrypted laptop is stolen, the data on it remains protected.
Alex: And access controls?
Sam: Access controls are about ensuring that only authorised users can access specific resources, and that they can only do what they need to do. The principle of least privilege says that every user, account, and process should have only the minimum permissions necessary to perform their function. Multi-factor authentication adds a second layer of verification beyond passwords, dramatically reducing the risk of account compromise even if a password is stolen.
Alex: What about detecting attacks that get through the outer defences?
Sam: Intrusion detection systems monitor network traffic and system activity for patterns that indicate malicious behaviour, generating alerts when suspicious activity is detected. Intrusion prevention systems go further and can automatically block traffic that matches known attack signatures. Security information and event management systems, SIEM, aggregate and correlate events from across the IT environment, enabling analysts to spot attack patterns that would be invisible when looking at any single source.
Alex: It's a complex ecosystem to manage.
Sam: It is, and that's why the concept of defence in depth is so important. No single tool covers everything. The combination of controls, and the quality of the processes around them, determines the overall security posture of an organisation.
Alex: Brilliant. Thanks Sam. Next we look at how organisations manage and control security at a policy level.