Cyber Security: Steps to Perform Vulnerability Assessments

Cyber Security: Steps to Perform Vulnerability Assessments

At Home Task: Perform a Vulnerability Assessment Using Windows Defender, XProtect or GateKeeper Objective: Use in-built software on Windows or Mac to scan for vulnerabilities and malware. Instructions Mac users: Built-in Tools are XProtect and Gatekeeper. XProtect is Apple’s built-in anti-malware system that automatically updates to protect against known malware. XProtect works in the background…

Cyber Security Identity Verification Methods

Cyber Security Identity Verification Methods

Security Tokens A security token is a physical device or software that helps confirm a user’s identity by generating a one-time passcode or by working together with a password. Security tokens can be either hardware-based (like a USB dongle) or software-based (like a mobile app). Types of Security Tokens Hardware Tokens Software Tokens How Security…