Professional Documents
Culture Documents
Information Security
ISEC-210
Module Compiler
Allan Nila Chongwe – MSc. Computer Science, BSc. Information Technology
2021
All rights are reserved. No part of this publication may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording or otherwise without copyright
clearance from Malawi University of Science and Technology.
4.0 Introduction
During the course of this unit, you will find the following key words
or phrases. Watch out for these and make sure that you understand
what they mean.
Access Identification Authentication
Authorization
4.5 Authorization
This can have a direct business impact, resulting in mistakes and missed
opportunities, wasted money and lost income, not to mention
lawsuits. But beyond these immediate losses are the broader problems
of public confidence and brand reputation. A company that does not
effectively serve its market can lose the confidence of its customers,
resulting in long-term damage to its brand.
i. Information classification
ii. Secure document storage
iii. Application of general security policies
iv. Education of information custodians and end users.