Tag: Cyber security
-
Introduction to computer forensics and investigations
This post was republished to Triathlon John at 17:51:12 17/12/2014 Introduction to computer forensics and investigations These are my notes from the course provided by OpenLearn, they are not intended to provide guidance in a work environment and I accept no responsibility for how these are used – they are simply my notes made from…
-
Introduction to cyber security – Week 1, Threat Landscape
Terminology CIA – guiding principal Confidential – only to be read by right people Integrity – only changed by authorised people/processes Availability – available to read/use whenever we want Information assets Information asset could be customer data amongst other things Authentication – necessary to verify identity of source of request of information. Non-repudiation – ensuring…