![]() ![]() The security triad The Information Security Triad: Confidentiality, Integrity, Availability (CIA) Confidentiality We will then follow up by reviewing security precautions that individuals can take in order to secure their personal computing environment. Several different measures that a company can take to improve security will be discussed. We will begin with an overview focusing on how organizations can stay secure. In this chapter, we will review the fundamental concepts of information systems security and discuss some of the measures that can be taken to mitigate security threats. In order for a company or an individual to use a computing device with confidence, they must first be assured that the device is not compromised in any way and that all communications will be secure. IntroductionĪs computers and other digital devices have become essential to business and commerce, they have also increasingly become a target for attacks. If you are not required to use this edition for a course, you may want to check it out. Please note, there is an updated edition of this book available at. identify and understand the high-level concepts surrounding information security tools and. ![]() ![]() identify the information security triad.Upon successful completion of this chapter, you will be able to: ![]()
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |