Beruflich Dokumente
Kultur Dokumente
Learning Objectives:
Data Encryption
User ID and passwords
Biometric Verification
Security Tokens, Key Fobs or Soft Tokens
Data:
EMP (Electromagnetic pulse or server crash
Checksums
Cryptographic checksums – verification of integrity
Backup or redundancies
Networking and Computer Security
AVAILABILITY
• is best ensured by rigorously maintaining all hardware,
performing hardware repairs immediately when needed and
maintaining a correctly functioning operating system
environment that is free of software conflicts.
• Providing adequate communication bandwidth and preventing
the occurrence of bottlenecks are equally important.
Software Security Equipment: