Human Factors Used in Authentication
Chapter 6: Information Systems Security
Learning Objectives
Upon successful completion of this chapter, you will be able to: identify the information security triad; identify and understand the high-level concepts surrounding information security tools; and secure yourself digitally.
- identify the information security triad;
- identify and understand the high-level concepts surrounding information security tools; and
- secure yourself digitally.
Source: David T. Bourgeois, https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
This work is licensed under a Creative Commons Attribution 4.0 License.