information security , act of protecting data and info from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction , information systems security , act of protecting the systems that holds and process our critical data , CIA, confidentiality, integrity, availability, confidentiality , information that has not been disclosed to unauthorized people , integrity, info has not been modified or altered w/out proper authorization, availability , info is able to be stored, accessed, or protected at all times, AAA, authentication, authorization, accounting , authorization , occurs when user is given access to a certain piece of data or certain areas of the building , authentication , when a persons identity is established with proof and confirmed by a system , KAHDS, Know, are, have, do, somewhere , accounting , tracking of datat, computer usage, and network resources , non repudiation , when you have proof that someone has taken as action .

لوحة الصدارة

النمط البصري

الخيارات

تبديل القالب

)
استعادة الحفظ التلقائي: ؟