Research should include
- physical security threats
- social engineering
- equipment access vulnerability
- data security threats
- hacking
- denial of service
- virus
- malware
- interception of data due to radiofrequency monitoring/emissions.
Process/Skill Questions:
- What are some of the common threats to data security?
- How do unauthorized individuals get access to data that should be secure?
- What are common types of cyberattacks?
- Why should a security plan be an integral part of an acceptable use policy?
- What are some common methods to mitigate data security threats?