You learned about the goals of security based on the CIA triad from a previous section, and you have an understanding of the terms vulnerability, threats and risks. Now, watch this video to understand the types of controls and their functions to ensure the confidentiality, availability, and integrity of information systems.
Source: Z. Cliffe Schreuders, https://www.youtube.com/watch?v=IkJ7x6yI8W0
This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Thursday, November 19, 2020, 8:58 PM