top of page

Learning Objectives

After watching the video or reading the content on Use and Safety Preventative Methods II, educators and administrators will be able to:

  • Identify current methods that can be implemented to protect a computer network from internal threats.

  • Identify internal devices that can be used to transmit computer network viruses.

  • Identify methods that could be used prevent internal attacks by users on a computer network.

  • Identify permission restriction methods that can improve internal control and computer network safety.


bottom of page