HLS 470 Cyber and Physical Security Vulnerabilities and Methodologies
Cyber technology, such as Internet browsing and various electronic transmitting and receiving devices, has revolutionized and transformed the world and the ability to communicate rapidly with virtually anyone on Earth; however, unwelcome infiltration by malefactors using various techniques and tools such as phishing, spam, and viruses to pilfer proprietary information and data has created a viable threat transcending borders. . This course will examine the implementation of cyber technology usage and physical security vulnerability in the United States. The student at the introductory level will learn how to analyze risk, understand biometrics, safeguard information, protect property and equipment, and conduct risk management mitigation exercises.