You must first complete Quiz – Broker Agreements With Licensees & Assistants before viewing this Lesson
Reading Time: 2 minutes
  1. Intra Office Confidentiality Overview
  • confidentiality training
  • exit procedures

2. Data Breach – PROTECTING PERSONAL INFORMATION

  • safeguarding data
  • data protection
  • electronic security measures

 3. Cyber Security Glossary

  • Adware
  • Anti-Virus Software
  • Application
  • Attachment
  • Authentication
  • Authorization
  • Backdoor
  • Backup
  • Bad-ware
  • Bandwidth
  • Blacklisting Software
  • Blended Threat
  • Blog
  • Broadband
  • Browser
  • Brute Force Attack
  • Clear Desk Policy
  • Clear Screen Policy
  • Cookie
  • Credit Cyberbullying
  • Card
  • Cyberbullying
  • Debit Card
  • Denial of Service Attack
  • Dictionary Attack
  • Digital Certificate
  • Domain Hijacking
  • Domain Name System (DNS)
  • Dumpster Diving
  • Electronic Infections
  • Encryption
  • End User License Agreement (EULA)
  • File-Sharing Programs
  • Firewall
  • Flooding
  • Grooming
  • Hacker
  • HTTPS
  • Hybrid Attack
  • Instant Messaging (IM)
  • IP (Internet Protocol) Address
  • Internet Service Provider (ISP)
  • Keystroke Logger
  • Malware
  • Man-In-the-Middle Attack
  • Monitoring Software
  • Network
  • Operating System (OS)
  • Password
  • Password Cracking
  • Password Sniffing
  • Patch
  • Phishing
  • Pharming
  • Router
  • Script
  • Shoulder Surfing
  • Skimming
  • Social Engineering
  • Social Networking Websites
  • Spam
  • Spim
  • Spoofing
  • Spyware
  • SSL (Secure Socket Layer)
  • Trojan Horse
  • URL
  • URL Obfuscation
  • Virus
  • Vishing
  • Vulnerability
  • Whitelisting Software
  • Worm
  • Zombie Computer

4.  Securing Wireless Networks

  • risks to wireless networks
  • plan for minimizing risks to wireless networks

 5. Free Data Security Resources

  • Links for data security

6. Quiz – Intra Office Confidentiality


  • Intra Office Confidentiality Overview

At the conclusion of this activity, participants will be able to

  1. Discuss Intra/Inter office Confidentiality
  2. Setup confidentiality training
  3. Devise response and exit procedures
  4. Create policies for inter/intra confidentiality
  •  What Is a Breach of Confidentiality in the Workplace?

At the conclusion of this activity, participants will be able to

  1. List information that needs safeguarding
  2. Explain the steps for safeguarding information 
  •  Data Breach – PROTECTING PERSONAL INFORMATION

At the conclusion of this activity, participants will be able to

  1. Explain the importance of safeguarding data
  2. Categorize data on computers for protection
  3. Collect data to delete
  4. Revise electronic security measures
  5. Practice security measures with staff
  6. Prepare for possible network breaches 
  •  Cyber Security Glossary

At the conclusion of this activity, participants will be able to

  1. Explain
  • Adware
  • Anti-Virus Software
  • Application
  • Attachment
  • Authentication
  • Authorization
  • Backdoor
  • Backup
  • Badware
  • Bandwidth
  • Blacklisting Software
  • Blended Threat
  • Blog
  • Broadband
  • Browser
  • Brute Force Attack
  • Clear Desk Policy
  • Clear Screen Policy
  • Cookie
  • Credit Cyberbullying
  • Card
  • Cyberbullying
  • Debit Card
  • Denial of Service Attack
  • Dictionary Attack
  • Digital Certificate
  • Domain Hijacking
  • Domain Name System (DNS)
  • Dumpster Diving
  • Electronic Infections
  • Encryption
  • End User License Agreement (EULA)
  • File-Sharing Programs
  • Firewall
  • Flooding
  • Grooming
  • Hacker
  • HTTPS
  • Hybrid Attack
  • Instant Messaging (IM)
  • IP (Internet Protocol) Address
  • Internet Service Provider (ISP)
  • Keystroke Logger
  • Malware
  • Man-In-the-Middle Attack
  • Monitoring Software
  • Network
  • Operating System (OS)
  • Password
  • Password Cracking
  • Password Sniffing
  • Patch
  • Phishing
  • Pharming
  • Router
  • Script
  • Shoulder Surfing
  • Skimming
  • Social Engineering
  • Social Networking Websites
  • Spam
  • Spim
  • Spoofing
  • Spyware
  • SSL (Secure Socket Layer)
  • Trojan Horse
  • URL
  • URL Obfuscation
  • Virus
  • Vishing
  • Vulnerability
  • Whitelisting Software
  • Worm
  • Zombie Computer
  •  Securing Wireless Networks

At the conclusion of this activity, participants will be able to

  1. Identify risks to wireless networks
  2. Formulate a plan for minimizing risks to wireless networks
  •  Free Data Security Resources

At the conclusion of this activity, participants will be able to

  1. Select and prepare resources for Data Security

 

Back to: 🔥Synchronous Post Broker Course-2020s > Intra/Inter Office Confidentiality