Videos, Slides, Films

Computer security

Available as
Online
Summary

Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on ha...

Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer security experts to explain measures that every company should take in order to protect its information assets. Fire walls, virus containment, encryption, authentication, access controls, and the development of a corporate culture of security are stressed.

Details

Additional Information