Threats and vulnerabilities |
- Malware
- Application threats
- Network threats
- Social engineering |
Operational Security |
- Human Resources
- Systems operation |
Identification and authentication |
- Introduction: Authentication process, Authentication risk.
- Authentication methods: Passwords, Tokens, Biometrics.
- Remote authentication
- Identity management |