am
🧠

Information Security

  • Techniques and policies used to ensure proper access too data

CIA Triad

  • Confidentiality
    • Ensuring data is protected from unauthorized access
  • Integrity
    • Ensuring that data can be modified only by appropriate mechanisms
  • Availability
    • The degree to which authorized users can access information for legitimate purposes

Computer Science Security