Computer security
Description
Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer security experts to explain measures that every company should take in order to protect its information assets. Fire walls, virus containment, encryption, authentication, access controls, and the development of a corporate culture of security are stressed.
Runtime
30 min
Subjects
- Information technology (161)
- Technological innovations (514)
- Computer networks (77)
- Computer crimes (87)
- Computer security (97)
Genre
Date of Publication
[2005], c1999
Database
Films on Demand
Direct Link
Similar Films
Virtual Crime and the Future
Science of surveillance
CyberSafety
Windows 10 for dummies security & maintenance course. Removing unwanted updates
Piracy
Digital literacy for dummies social media and computing security course. Protecting computers from human threats
What should Yahoo become?
Cloud-based file transfer tools for dummies WeTransfer and Dropbox course. Staying safe on WeTransfer
Windows 10 for dummies networking & OneDrive course. Accessing all files on your PC from OneDrive
Whatever happened to privacy?
On China. Spy vs. spy (U.S./China relations)
Can Symantec keep up with hackers?
Vogue. Sextortion and the Internet
Digital literacy for dummies social media and computing security course. Why personal information is big business online
NOVA. Rise of the hackers