Computer security
Description
Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer security experts to explain measures that every company should take in order to protect its information assets. Fire walls, virus containment, encryption, authentication, access controls, and the development of a corporate culture of security are stressed.
Runtime
30 min
Subjects
- Information technology (161)
- Technological innovations (514)
- Computer networks (77)
- Computer crimes (87)
- Computer security (97)
Genre
Date of Publication
[2005], c1999
Database
Films on Demand
Direct Link
Similar Films
Us now. What society gains from online collaboration
Privacy and security
CyberEthics
Cybersecurity jobs
Internet careers. Front-end, back-end & e-everywhere
The Internet. Portal to everywhere
60 minutes. Hi-tech heist
Think b4 u Post
Windows 10 for dummies security & maintenance course. Allowing or blocking apps from accessing networks
Science of surveillance
Balancing cyber security with privacy
Windows 10 for dummies settings & hardware course
How much Silicon Valley data has been breached?
Digital dark age? Gambling with humankind's knowledge
Google chrome for dummies course