Computer and Other
Technical Vulnerabilities

Computer Vulnerabilities
Secure use of your office network, personal computer, and mobile devices. User authentication and passwords. Email pitfalls, malware and email scams, and social engineering. Risks associated with social networking and peer-to-peer. Protecting laptop and other mobile devices. The insider threat to IT security. Secure disposal of hard drives.

Intercepting Your Communications
Standard telephones, mobile phones, cordless phones, voice mail vulnerability, fax machines, other common wireless devices.

Bugs and Other Eavesdropping Devices
Overview of the threat, methods of eavesdropping, detecting and preventing eavesdropping, emissions security.
 

HOME    |    HELP
INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
ESPIONAGE 101  | TERRORISM 101