Security+
-
Biometrics: Installing Biometric Devices
Biometrics: Biometrics systems use some kind of unique biological trait to identify a person, such as fingerprint, patterns on the…
Read More » -
Directory Traversal/Command Injection
Directory Traversal and Command Injection: If an attacker is able to gain access to restricted directories (such as the root…
Read More » -
Antimalware
Antimalware: To keep all hosts safe from malware, there are a number of actions you should take at minimum: Install…
Read More » -
Smart Cards
Smart Cards are generally used for access control and security purposes. The card itself usually contains a small amount of…
Read More » -
Wi-Fi Encryption
Wi-Fi Encryption requires a short discussion of its own. In such an environment, the clients and the access point share…
Read More » -
Pretty Good Privacy
Pretty Good Privacy (PGP) is a freeware email encryption system. PGP was introduced in the early 1990s, and it’s considered…
Read More » -
The Patriot Act
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001…
Read More » -
The Computer Security Act of 1987
The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires…
Read More » -
The Cyberspace Electronic Security Act
The Cyberspace Electronic Security Act (CESA) was passed in 1999, and it gives law enforcement the right to gain access…
Read More » -
The Family Educational Rights and Privacy Act
The Family Educational Rights and Privacy Act (FERPA) dictates that educational institutions may not release information to unauthorized parties without…
Read More »