LO2 - Know the threats and vulnerabilities posed by new technologies, the most common types of computer attacks and ways to protect against them. |
A6 A7 A8 A9 A10
|
B1 B3 B6 B7
|
C9
|
D5
|
LO4 - Be able to design and evaluate appropriate measures for user identification and authentication, as well as the management of identities and associated authorizations. |
A6 A7 A8 A9 A10
|
B1 B3 B6 B7
|
C9
|
D5
|