Congratulations, you've made it to the last chapter! This chapter reviews the types of attacks that threaten the security of computers and the data contained on them. A technician is responsible for the security of data and computer equipment in an organization. This chapter describes how you can work with customers to ensure that the best possible protection is in place. Risks to computers and network equipment come from both internal and external sources. Risks include physical threats, such as theft or damage to equipment, and data threats, such as the loss or corruption of data. After completing this chapter, you will meet these objectives:
Assignment: Chapter 16 Review worksheet and place in the hand-in folder by the end of class on Friday |