1.4.2 Identifying and preventing vulnerabilities

Common prevention methods

Penetration testing

Anti-maleware software

Firewalls

User access levels

Passwords

Encryption

Physical security