Introduction to computer forensics and investigations

This post was republished to Triathlon John at 17:51:12 17/12/2014 Introduction to computer forensics and investigations These are my notes from the course provided by OpenLearn, they are not intended to provide guidance in a work environment and I accept no responsibility for how these are used – they are Continue Reading

Introduction to cyber security – Week 1, Threat Landscape

Terminology CIA – guiding principal Confidential – only to be read by right people Integrity – only changed by authorised people/processes Availability – available to read/use whenever we want Information assets Information asset could be customer data amongst other things Authentication – necessary to verify identity of source of request Continue Reading