_ Data Security & Risk Management________ How to Get & Avoid Viruses/Malware 1. Non­Comprehensive Anti­Virus Protection _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ 1. Weak/Outdated (non­patched) programs _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ 2. Weak or Repeated Passwords _________________________________________________________________________________________________ _________________________________________________________________________________________________ 3. Social Engineering __________________________________________________________________________________________ __________________________________________________________________________________________ _________________________________________________________________________________________________ 4. Phishing Techniques _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Encryption Process of encoding messages (or information) in such a way that only authorized parties can read it _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Network Security _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Educating Yourself/Every Member of Your Team _________________________________________________________________________________________________ _________________________________________________________________________________________________ E­Mail Security Tips _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ To Download this or any of Craig’s Courses go to www.RETI.ws/students _ Data Security & Risk Management________ Internet Security Tips _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Computer Security Tips _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Cloud Solution Tips Security Tips _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Personal Security Tips _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ State Laws Online Display _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ NAR & Local IDX Policies _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ NAR Short Messaging Exception Rule _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Can­spam Act of 2003 _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ Junk Fax Prevention Act _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ To Download this or any of Craig’s Courses go to www.RETI.ws/students _ Data Security & Risk Management________ Electronic Signatures ­ Uniform Electronic Transaction Act _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ NAR Code of Ethics Article 9 _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________ NAR Code of Ethics Article 14 _________________________________________________________________________________________________ _________________________________________________________________________________________________ _________________________________________________________________________________________________
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-