Guaranteeing Data is Encrypted, Secure & Has Low Risk of Being Manipulated
Time: 3:15 pm
day: Day Two
Details:
• Ensuring data is not deleted or changed
• Understand where data will be backed up if there is a breach
• Explaining the real time intrusion traffic encountered daily