|
5.0 Security
- Encryption technologies
- Data wiping / hard drive destruction / hard drive recycling
- Software firewall
- Authentication technologies
- User name
- Password
- Biometrics
- Smart cards
- Basics of data sensitivity and data security
- Compliance
- Classifications
- Social engineering
- Wireless encryption
- WEPx and WPAx
- Client configuration (SSID)
- Malicious software protection
- Viruses
- Trojans
- Worms
- Spam
- Spyware
- Adware
- Grayware
- BIOS Security
- Drive lock
- Passwords
- Intrusion detection
- TPM
- Password management / password complexity
- Locking workstation
- Hardware
- Operating system
- Biometrics
|
|
|