Video Description

This lesson covers risk mitigation through technology. This can be accomplished in the following ways: - Access control - Network devices - Cryptography This unit specifically focuses on access control which is the data flow between a subject and an object in which the subject is active; a person, process or program and the object is passive; a resource such as a file or printer.

Course Modules