Human Factors Used in Authentication

Chapter 6: Information Systems Security

Learning Objectives


Upon successful completion of this chapter, you will be able to: identify the information security triad; identify and understand the high-level concepts surrounding information security tools; and secure yourself digitally.

  • identify the information security triad;
  • identify and understand the high-level concepts surrounding information security tools; and
  • secure yourself digitally.

Source: David T. Bourgeois, https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 License.