Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
1. INTRODUCTION TO CYBERSECURITY
1.1. The CIA Triad
-
Confidentiality – Ensuring only authorized people can access data.
-
Integrity – Making sure data is accurate and unaltered.
-
Availability – Ensuring systems and data are accessible when needed.