penetration testing
⃝ network forensics
⃝ network policies
⃝ anti-malware software
⃝ firewalls
⃝ user access levels
⃝ passwords
⃝ encryption.