University of Victoria

- Technical : Smart cards, ACLs, encryption etc - Administrative : Policies, procedures, DRP(Disaster recovery plan) etc. Protection Methods - User Awareness - Authentication - Anti-malware - Data Backups - Encryption - Data Removal *Good security plan + Good protection method = Solid defense (Defense in depth) Types of Hackers - White Hat ... ................
................