3.2 Software
• Virus scan, malware detectors and removers
3.3 Networks
Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
• Physical security: for example, locks
3.4 Internet
Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware