Secure use of your office
network, personal computer, and mobile devices. User authentication and
passwords. Email pitfalls, malware and email scams, and social engineering.
Risks associated with social networking and peer-to-peer. Protecting laptop
and other mobile devices. The insider threat to IT security. Secure disposal
of hard drives.
Intercepting Your Communications
Standard telephones, mobile phones, cordless phones,
voice mail vulnerability, fax machines, other common wireless devices.
Bugs and Other Eavesdropping Devices
Overview of the threat, methods of
eavesdropping, detecting and preventing eavesdropping, emissions security.