INFORMATION SECURITY

(0 review)
$580.00
INFORMATION SECURITY

CUT THE RISK -Using Computers can be Risky -but not using them can be too!

Learn to keep information on your computer secure.
  • A course equally important for the individual through to the largest corporation

The most important security concepts related to information on the internet are confidentiality, integrity and availability, whereas the most important concepts related to the people using the information on the internet are authorisation, authentication and non-repudiation.

Learn about Information Security

 


WHO IS USING YOUR COMPUTER?
The first step is to ensure that only the authorised people are able to view that information, because confidentiality is a very important attribute when it comes to information security.
This may be obvious and simple -but it is a measure that is all too often relaxed.
This course does of course deal with much more complex issues as well though!
In some countries, there is a need to protect the privacy of individuals and prevent unlawful access to their information. This includes, but is not limited to: information stored in banks, hospitals and medical records, medical laboratories and medical research data, the tax office and many others.

When private information is circulating on an insecure network, it may be subject to many forms of misuse, including theft and corruption. Data corruption occurs when information is modified by a third-party, thus resulting in the loss of integrity for this data. It is important to note that information can be modified by people with or without malicious intent; for this reason, it is important to keep confidential information secure at all times, to avoid any accidental tampering (such as human error) or intentional tampering.

Needless to say, it is always important to maintain data integrity during any type of communication, but in critical cases such as EFT (electronic funds transfer), army and security agencies communications, and air traffic control, maintaining data integrity becomes an absolute necessity. This means that extreme care should be taken to prevent data from being deleted, modified, or becoming inaccessible, this resulting in loss of data availability and people won’t be able to access the information when required.

To secure data availability on the network, it is important to reduce network outages as much as possible, because the availability of the network itself is extremely important. If the network is down, network users will not be able to access the network and any resources available on that network.

Most organisations nowadays apply some form of security to restrict unlawful access to data stored on their networks. This is mainly achieved by using authentication and authorisation which will be explained below:

Authentication on a network provides a proof that a network user is indeed the person they are claiming to be, either by asking the user to input a password (something they know), a smartcard (something they have), or a biometric identity print (such as a finger print).

Authorisation on a network provides a proof that a certain network user has the right to read a file, run a program, delete a folder, or perform other network activities.

It is important to understand that authentication and authorisation work together, because a user needs to be authenticated first before they can be authorised to perform network activities.

Credentials

 

 

ACS Distance Education holds an Educational Membership with the ATA

 

ACS Distance Education holds an Educational Membership with the ATA

 

 

ACS is an Organisational Member of the British Institute for Learning and Development

 

ACS is an Organisational Member of the British Institute for Learning and Development

 

 

ACS Global Partner - Affiliated with colleges in seven countries around the world.

 

ACS Global Partner – Affiliated with colleges in seven countries around the world.

 

Course Features

  • Lectures 11
  • Quizzes 0
  • Duration 100 hours
  • Skill level All levels
  • Language English
  • Students 0
  • Certificate No
  • Assessments Self
  • Lesson Structure 0/11

    • Lecture1.1
      Introduction to Information Security
      0m
    • Lecture1.2
      Information Security Ethics
      0m
    • Lecture1.3
      Data Integrity and Backing up
      0m
    • Lecture1.4
      Vulnerabilities of Operating Systems and Information Systems
      0m
    • Lecture1.5
      Risk Management
      0m
    • Lecture1.6
      Information Security Technologies, Developments and Initiatives
      0m
    • Lecture1.7
      Physical Security
      0m
    • Lecture1.8
      Developing a security Policy
      0m
    • Lecture1.9
      Implementing and revising a security policy
      0m
    • Lecture1.10
      Business Continuity and Disaster Recovery Planning
      0m
    • Lecture1.11
      Information Security Maintenance
      0m

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
$580.00

Leave A Reply

Your email address will not be published. Required fields are marked *