-
Cybersecurity
-
Period: to
Cybersecurity
-
Weekly Quiz 1
- white-hat hackers and black-hat hackers
- BYOD = Bring your own device, used to prevent potential harm to company devices
- algorithm attacks force computers to use memory or overwork CPU
-
Weekly Quiz 2
- ensure system availability - up-to-date OS systems, equipment maintenance
- 3 types of sensitive information- PII, classified, business
- VPN virtual network that uses the public network
-
Weekly Quiz 3
- indicators of spam mail- misspelled words, punctuation errors
- rootkit modifies the operating system
- software to obtain information from user computer- spyware