IT Examiner School, Seaside, CA

Authentication Controls Passwords • Complexity • Expiration period • Re-use/history

• Failed login settings • Automatic timeout • Screen saver passwords • Reset procedures • Use of tokens/Biometric solutions

Corruption of Data

Virus/Malware detection practices • Frequency/scope of scans • Updates to detection applications

Automated tools to filter • Email • Web traffic

Made with FlippingBook - Online catalogs