CYBERSECURITY

 

examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture

  • Explain the cybersecurity culture
  • Describe and explain the IRB process
  • Identify technologies to log, monitor and audit networks and systems
Tags: No tags