1.4.2 Identifying and preventing vulnerabilities
Common prevention methods
Common prevention methods
Penetration testing
Penetration testing
Anti-maleware software
Anti-maleware software
Firewalls
Firewalls
User access levels
User access levels
Passwords
Passwords
Encryption
Encryption
Physical security
Physical security