Learn More
This study maps the typology of employee's information security behavior and links it to their knowledge of information security. A survey of the knowledge and practices of employees in the telecommunication sector was conducted and a typology clustering the employees into four groups based on the knowledge-behavior spectrum was developed. Each group was(More)
8. Semester and Year offered Trimester 1 (Delta Level) 9. Objective of the course/module in the programme : To introduce the fundamentals of computer authentication, including password, token and biometrics based authentications. At the completion of the subject, students should be able to: LO1: Describe the various techniques and algorithms underlying(More)
  • 1