Skip main navigation

Hurry, only 4 days left to get one year of Unlimited learning for £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

Summary for Week 1

This step summarize the content for Week 1
© Universiti Malaya

You have reached the end of Week 1.

To summarize, there are three important requirements in information security, which are confidentiality, integrity, and availability – the CIA Triad. You have read the articles on their respective definitions, and the details are further explained in the videos we provided.

For Week 2, after we understand the need for information security, we should know how to manage it. We’ll explore data breaches, which are one of the reasons behind the need for information security. We will also learn about the vulnerabilities, attacks and threats, and risks in the cyber world.

Are you ready for the next lesson?

© Universiti Malaya
This article is from the free online

Introduction to Information Security Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now