15Privacy&Securitystudyguide

15Privacy&Securitystudyguide - vi. Know how to...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Day 15—Data Security and Privacy I. Learning from the text a. Before class assignment i. Textbook chapter B6 (pp. 370 - 382) ii. Packet—Data Security through Backups b. Learning Objectives (reading quiz prep) i. Cover the basics of data security ii. Understand the difference between the first and second lines of defense iii. Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response iv. Describe the differences between types of malicious code v. Understand the principles of data backup
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: vi. Know how to install BYUs free anti-virus software vii. Understand basics of data privacy , including email privacy II. Key Terms a. Authentication b. Authorization c. Backup scope, frequency, and media d. Biometrics e. Content filtering f. Denial-of-service attack g. Encryption h. Firewall i. Hacker j. Hoaxes k. Information security l. Insider m. Intrusion detection software n. Malicious code o. Packet tampering p. Phishing q. Smart card r. Sniffer s. Social engineering t. Spoofing u. Spyware v. Token w. Trojan-horse virus x. Virus y. worm...
View Full Document

This document was uploaded on 03/05/2012.

Page1 / 2

15Privacy&Securitystudyguide - vi. Know how to...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online