a). Verify that any government equipment used for processing classified information has valid anti-virus software before connecting it to the internet b). Follow procedures for transferring data to and from outside agency and non-Government networks c). Purge the memory of ...
Home/cyber security