top of page
After watching the video or reading the content on Use and Safety Preventative Methods II, educators and administrators will be able to:
Identify current methods that can be implemented to protect a computer network from internal threats.
Identify internal devices that can be used to transmit computer network viruses.
Identify methods that could be used prevent internal attacks by users on a computer network.
Identify permission restriction methods that can improve internal control and computer network safety.
bottom of page