Access control, Restricting access to data., Authentication, Verifying a user’s identity., Authorisation, Granting permission to access resources., Data encryption, Converting data into unreadable code., Firewall, System that protects a network., Intrusion detection system., Monitors for unauthorized activity., Password policy, Rules for creating and managing passwords., Social engineering, Manipulating people to reveal information..

Unit 8- Staying Safe

tekijä

Tulostaulu

Visuaalinen tyyli

Vaihtoehdot

Vaihda mallia

)
Säilytetäänkö automaattisesti tallennettu tehtävä ?