Search ALEX...

Course: Information Technology Fundamentals

CTE22.IT.ITF.28

Explain why it is important for businesses to secure and protect their data and describe scenarios which might result in compromised data.

COS Examples

Examples: human error (social engineering, sharing password), physical compromise of devices (spoofing devices)

ALSDE LOGO