information security , act of protecting data and info from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction , information systems security , act of protecting the systems that holds and process our critical data , CIA, confidentiality, integrity, availability, confidentiality , information that has not been disclosed to unauthorized people , integrity, info has not been modified or altered w/out proper authorization, availability , info is able to be stored, accessed, or protected at all times, AAA, authentication, authorization, accounting , authorization , occurs when user is given access to a certain piece of data or certain areas of the building , authentication , when a persons identity is established with proof and confirmed by a system , KAHDS, Know, are, have, do, somewhere , accounting , tracking of datat, computer usage, and network resources , non repudiation , when you have proof that someone has taken as action .
0%
overview security
Podijeli
Podijeli
Podijeli
Autor
Jessicalmoore51
High
CS
Cybersecurity
Uredi sadržaj
Ispis
Postavi
Više
Zadatke
Top-lista
Pokaži više
Pokaži manje
Ova top-lista je trenutno privatna. Odaberite opciju
Podijeli
da biste je javno objavili.
Ovu top-listu onemogućio je vlasnik sadržaja.
Ova top-lista je onemogućena jer se vaš odabir opcija razlikuje od postavki vlasnika sadržaja.
Vrati opcije na početne postavke
Spoji parove
je otvoreni predložak. Ne generira rezultate za top-listu.
Prijava je obvezna
Vizualni stil
Fontovi
Potrebna je pretplata
Postavke
Promijeni predložak
Prikaži sve
Više formata prikazat će se dok budete igrali.
)
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski spremljeno:
?