Identify various security practices for computer and network systems, such as how to control access to secured resources and computer resources. Give specific examples of methods that an administrator can use, like encryption techniques, basic input/output system (BIOS) features, and strategies for dealing with malware.
Standard detail
32
Depth 1Parent ID: 030A3586E43749BB835BC5D2CF5F4799Standard set: Computer Science Foundations
Original statement
Quick facts
- Statement code
- 32
- List ID
- 32
- Standard ID
- D2044AC6C49D4EA79BADED34A29F7453
- Subject
- CTE (2020-)
- Grades
- 09
- Ancestor IDs
- 030A3586E43749BB835BC5D2CF5F4799
- Source document
- Computer Science Foundations
- License
- CC BY 4.0 US