1.3 Information and Cybersecurity
There are many threats to the confidentiality, integrity, and availability (C-I-A) of information maintained by organizational systems, as well as many countermeasures, such as virus scanners, firewalls, security patches, and password change control systems, and a range of other technologies and techniques that are available to improve information and cybersecurity. Even though many of these security mechanisms can be automated, and even though the public has become increasingly aware of the pervasive information security threats, they frequently do not utilize these technologies, even when they are readily, and often freely, available. An important question then is, why do people who are aware of cybersecurity ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.