Investigate security issues related to technology.
Investigation should include research to identify threats to computer systems (e.g., spam, malicious software, theft) and the methods for guarding against such threats, including
- malware protection software
- firewalls
- regular backups
- password protection
- data encryption
- software updates
- limiting access to devices and portable storage.