Center for Educational Research
3141 Chestnut Street, Bossone 512
Philadelphia, PA 19104
Additional Upper Division Topics
Computer systems store very critical corporate and individual information. While the information is widely available to authorized users, it is also vulnerable to threats from unauthorized agents. this module introduces various measures used to prevent unauthorized access to information. Some of the strategies include encrypting data, use of digital systems, enclaves and protective frewalls.
site is best viewed with Internet Explorer v6 for Windows (v5 for Mac) or higher,
Netscape v7 or higher, or any browser meeting the W3C web standards.