-
-
-
- white-hat hackers and black-hat hackers
- BYOD = Bring your own device, used to prevent potential harm to company devices
- algorithm attacks force computers to use memory or overwork CPU
-
- ensure system availability - up-to-date OS systems, equipment maintenance
- 3 types of sensitive information- PII, classified, business
- VPN virtual network that uses the public network
-
- indicators of spam mail- misspelled words, punctuation errors
- rootkit modifies the operating system
- software to obtain information from user computer- spyware