Unauthorized access entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent
Unauthorized access can be internal or external
By the end of this session you should be able to explain the purpose and features of:
Physical security
Biometric security
Password policies
Access control lists
Backup and restore procedures
Firewall and AV protection
and how they may be used in local and wide area networks
Biometrics
Physical and biometric security measures that can be used to protect networks
Password policies
How network managers can enforce password security