Research and describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc. Investigate and distinguish among the following common prevention methods to secure a computer system. For a given scenario, identify the most applicable best practice to secure a workstation as well as describe methods for data destruction and disposal. Implement these practices and write a justification for each scenario solution. Provide supporting evidence for each solution, drawing on technical texts and industry standards. Prevention methods include:
Standard detail
18
Depth 1Parent ID: 5504B991A6D44FBEAA7F1FE206299DAFStandard set: Computer Systems
Original statement
Quick facts
- Statement code
- 18
- List ID
- 18
- Standard ID
- 36C6B88D5D5640CFB58A309B948AB668
- Subject
- CTE (2020-)
- Grades
- 11, 10
- Ancestor IDs
- 5504B991A6D44FBEAA7F1FE206299DAF
- Source document
- Computer Systems
- License
- CC BY 4.0 US