- just listing isn’t enough. We need to know the purpose and technical details of each security technique
- List the names, purposes and characteristics of a range of security techniques. Justify the use of a range of security techniques in typical situations.
Describe the security techniques used for the following
situations and justify their uses:
a) Separating files of one user from another
b) Making data secure and hard to read by unauthorised users
c) Detecting malicious files received from the Internet
d) Blocking unwanted traffic trying to access a network
