Introduction to Security Terminology
2.01 Goals of Information Security
2.02 Understanding Authentication and Authorization
2.03 Understanding Security Principles and Terminology
2.04 Looking at Security Roles
This chapter covers the meaning of terms such as authentication, authorization, confidentiality, and integrity. You will explore the concepts of authentication versus authorization, data confidentiality, and the methods through which data is considered secured. Later chapters explore these topics in detail, but a solid high-level understanding is required first.
1. Your company issues smart phones to employees for business use. Corporate policy dictates that all data stored ...