- Since you will be spending a lot of time in Cyberspace, securing/protecting your digital work environment is important
- Securing yourself starts with knowing what you have! (Inventory What you got)
- Networking and Hardware (Identify the following devices and prepare a table for your reference)
4. Your Table should have columns for the make, model and serial number (at least the make and model)
5. Software and Application
Things to Remember
- Software is layered – Protecting your operating system; protecting each application.
- Ways to Protect the Operating System and applications