Module 5 Review And Discussions

0 comments

 Answer the following questions in a Microsoft®  Word document and save the file on your computer with your last name in the file. (Example: module_05_review_Jones.doc) 1. What are six examples of information technologies that could be used in computer crimes. 2. What is the CIA triangle? 3. What are three most common security threats? 4. What are three most common security measures? 5. What are 10 guidelines that should be included in a comprehensive security system? 6. Explain business continuity planning. 7. What are five examples of biometric security measures? 8. Define zero trust security. What are three of its principles? 
The post Module 5 Review And Discussions appeared first on prowriterhub.com.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}