CWSP Guide to Wireless Security
J. Paloschavez, M. Troxler, J. Boggs, J. Lagas Chapters 9 & 10 IA705 Spring 2003 1 Chapters 9 & 10, Modern Operating Systems by A. S. Tanenbaum Group E.
Security
The Secure Environment
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.