IT Examiner School, Seaside, CA
Authentication Controls Passwords • Complexity • Expiration period • Re-use/history
• Failed login settings • Automatic timeout • Screen saver passwords • Reset procedures • Use of tokens/Biometric solutions
Corruption of Data
Virus/Malware detection practices • Frequency/scope of scans • Updates to detection applications
Automated tools to filter • Email • Web traffic
Made with FlippingBook - Online catalogs