top of page

Learning Objectives
After watching the video or reading the content on Use and Safety Preventative Methods II, educators and administrators will be able to:
-
Identify current methods that can be implemented to protect a computer network from internal threats.
-
Identify internal devices that can be used to transmit computer network viruses.
-
Identify methods that could be used prevent internal attacks by users on a computer network.
-
Identify permission restriction methods that can improve internal control and computer network safety.
bottom of page