information security , act of protecting data and info from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction , information systems security , act of protecting the systems that holds and process our critical data , CIA, confidentiality, integrity, availability, confidentiality , information that has not been disclosed to unauthorized people , integrity, info has not been modified or altered w/out proper authorization, availability , info is able to be stored, accessed, or protected at all times, AAA, authentication, authorization, accounting , authorization , occurs when user is given access to a certain piece of data or certain areas of the building , authentication , when a persons identity is established with proof and confirmed by a system , KAHDS, Know, are, have, do, somewhere , accounting , tracking of datat, computer usage, and network resources , non repudiation , when you have proof that someone has taken as action .
0%
overview security
共享
共享
共享
由
Jessicalmoore51
High
CS
Cybersecurity
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
)
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?