1.4.2 Security: Passwords, Firewall, SSL & Encryption

○ use of passwords, both entered at a keyboard and biometric
○ use of firewalls, both software and hardware, including proxy servers
○ use of Secure Socket Layer (SSL)
○ use of symmetric encryption (plain text, cypher text and use of a key) showing understanding
that increasing the length of a key increases the strength of the encryption