Password Protected
Nope
Yep, that's right!
Career Guidance Knowledge services K103 - security services K1031 - military and defence Cyber attack counter-measures
Description
Methods, technologies and techniques used to defend (detect, monitor and recover) against cyber attacks. These cyber attacks include several attack vectors such as malware, denial of service (DoS) attacks and phishing. Intrusion prevention systems (IPS), firewall, antivirus, intrusion detection systems (IDS), cybersecurity training, backup, Information Security Management System (ISM), multi-factor authentication and employ awareness, are some examples of the methods used.
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 5 occupations
- Optional in 2 occupations
- Total: 7 occupations
- Most common in: ISCO major group 2 (Professionals)
Essential for
- ICT security administratorICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
- Digital forensics expertDigital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- ICT network administratorICT network administrators maintain operation of a reliable, secure, and efficient data communications network, including LAN, WAN, intranet, and internet. They perform network add…
- ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
Optional for
- ICT disaster recovery analystICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
- Software developerSoftware developers designs and builds computer programs that power mobile devices, desktop computers, and even cars. They not only identify user needs but also create new applicat…
Related skills
- ICT security legislation
- ICT network security risks
- Cyber security
- Manage IT security compliances
- ICT infrastructure
- ICT encryption
- Identify ICT system weaknesses
- Organisational resilience
- Information security strategy
- Execute ICT audits
- Implement a virtual private network
- ICT security standards
Last updated on February 18, 2026
