The process used to prevent unauthorized changes. Unauthorized changes often result in unintended outages.
Click to view the back
Click to view the front
Personal Electronic Device.
Small devices such as cell phones, radios, CD players, DVD players, video cameras, and MP3 players.
Remember this – Trojan
A Trojan appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system. Many Trojans are delivered via drive-by downloads. They can also infect systems from fake antivirus software, pirated software, games, or infected USB drives.