Description:
This lesson describes information security procedures and reasons why company information or technology should be protected.
Objectives:
RECALL characteristics of computer hardware, software, and system components.
RECALL effective measures to protect computer systems and information maintained on them.