You have reached the end of Week 1. To summarize, there are three important requirements in information security, which are confidentiality, integrity, and availability – the CIA Triad. You have …
To prevent risk, we need to perform an information security risk management which consists of 7 main steps as follows: 1. Identifying Assets – In the context of information security, …
Last week, you have been introduced to information security. Now, you will learn about data breaches. But how are these two related to each other? What is data breaches”? Data …
Before we go into more details. Do you know what is information security management? In a simple and easy explanation, information security management is defined as a way of protecting …