Page 132

The University of SydneyPage 59Technical Controls–Authentication and access control–Firewalls and De-MilitarisedZones–Network segmentation–End-point security–Malicious content control–Automation–AI for detection and prediction–Implementation of technological solutions is dependent upon cost justifying the controls