You are on page 1of 2

August 14, 2020

INFORMATION SECURITY

CIA triangle (three aspects)


 Confidentiality- if it’s being transferred to different units
-
 Integrity- how it is being processed
-quality or state of being whole, complete and uncorrupted
 Availability- making information accessible to user access without interference or
obstruction in the required format

Privacy- information is to be used only for purposes known to the data owner
- This does not focus on freedom from observation, but rather that information
will be used only in ways known to the owner

Identification- information systems possess the characteristic of identification they are


able to recognize individual users

Authentication- occurs when a control provides proof that a user possesses the identity
that he or she claims

Authorization- after the identity of a user is authenticated, a process called authorization


provides assurance that the user has-

Accountability- the characteristic of accountability exists when a control provides


assurance that every activity undertaken can be attributed to a named person or
automated process

Management
- A process of achieving objectives using a given set of resources
- To manage the information security process, first understand core principles

Managing Roles

Differences between leadership and management

DARKSIDE OF SOC MED

FB, YT, IG, Twitter

4 areas to explore
- Personal relationship
A false sense of connection
More people are building relationships online and drifting away from the
real worlds
- Decreased Productivity
Soc med before tasks
Soc med allows political figures to be more visible and can harm one’s
reputation
- Social Issues
Cyberbullying
Posting or forwarding a private text or embarrassing image to others
Tricking someone into revealing embarrassing information and forwarding
it to others
Spreading malicious rumors
Stealing passwords
- Disturbing content
Exposure to pornography
- Human Trafficking online

You might also like