In: Computer Science
After completing this module's learning activities, what are your thoughts about the systems security function in an organization? What short and long term goals are most important? (Support your analysis with evidence from the module.) How has this module changed your perspective on security in technology? Sometimes it seems like an endless race between hackers and security experts... who is ahead? Will we ever gain a significant lead? How?
A Learning Module is an organized collection of content presented together. A Learning Module can support a course goal, a course objective, a subject, a concept, or a theme
Information Security Triad: Confidentiality, Integrity, Availability (CIA)
Confidentiality
When protecting information, we want to be able to restrict access to those who are allowed to see it; everyone else should be disallowed from learning anything about its contents. This is the essence of confidentiality.
Integrity
Integrity is the assurance that the information being accessed has not been altered and truly represents what is intended
.Availability
Information availability is the third part of the CIA triad. Availability means that information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.
If you feel that you may lose your momentum in the pursuit of the bigger picture, or getting to your targets is a slog… than try setting clear, short-term goals.
You may have several goals to achieve in your personal or business life. But you can’t achieve any of them unless you break down the bigger goals into shorter achievable targets, each target moving you that much closer to the eventual goal.
Long term goals are good, but, hey, they are still long term.It is better to create short term goals which are realistic
Digital learning goes mainstream in a hurry and that's going to upend current education practices, models, and processes going forward.
Technology is touching high-tech but the security is also a big issue nowadays,for which many developer are working and creating a secure platform
High quality security is now available to keep data secured
There is an eternal struggle between hackers and cybersecurity experts. In the digital arms race, technology is invented to prevent the latest attacks, and new attacks are invented to thwart that technology. It takes a special combination of the right tech, the right policies, and the right education to get ahead of threat actors.
There are a number of issues in play when you consider the prevalence of cyberattacks in the digital age.. thank you!