- Analyze what needs to be considered when manipulating and storing data, such as size, security, and speed.
- List the various software and hardware used in implementing cyber security.
- List the human and computational aspects that comprise cyber security.
- Describe the people (“black hat” hackers, “white hat” hackers) and hardware (routers, modems, firewalls).
- Explain the workings and trade-offs of the Trust Model of the Internet (web of trust).