- The CIA Triad is a respected model used for the development of security systems and policies. It’s used to identify vulnerabilities and methods for addressing security problems and creating effective solutions.
- Raw data is refined into information companies can use to guide business growth and innovation. Companies are responsible for protecting their intellectual properly consumers’ personally identifiable information, and company confidential information. They must comply with local, state, and federal regulations or risk fines, penalties, and loss of consumer confidence.
- Cyberthreats come in all forms: hacking, theft, malware, and data leaks. Natural disasters also pose a threat to data and the hardware it resides on. Steps can be taken to mitigate or eliminate threats in the home, the workplace, and in datacenters.
- There are many types of attacks. Snooping, phishing, man-in-the-middle, and denial-of-service attacks are just a few. Understanding how these attacks work can help you identify the best ways to protect yourself against each attack type.
Go to next item