Dive into the concept of information securityModern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it. On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike. Discover the CIA Triad and how it worksThis course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data. Explore possible IT vulnerabilities, attacks, and threatsA threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application. You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat. |