diff --git a/pages/总复习2023t1.md b/pages/总复习2023t1.md index 9356479..6f1b6a4 100644 --- a/pages/总复习2023t1.md +++ b/pages/总复习2023t1.md @@ -2190,26 +2190,33 @@ - Objective :-> It aims to reduce the risk of cyber attacks, and protect against the unauthorised exploitation of systems, networks and technologies + - Trends and drivers of cybersecurity - Information Security + - Information Security x Privacy + collapsed:: true + - Information security and privacy are **closely related, + but distinct concepts** + - Privacy is :-> an individual’s right to control the use and + disclosure of their own personal information + - Information security is :-> the process used to keep + data private + - Security is the process; privacy is the result + - Privacy and Data Protection + collapsed:: true + - Data privacy are the regulations, or policies, that + governs the use of my data when shared with any + entity, while data protection is the mechanism — + that is, the tools and procedures — to enforce the + policy and regulation, including the prevention of + unauthorized access or misuse of the data that I + agreed to share - Seeks to protect all information assets, whether in hard copy or in digital form - - Privacy and Data Protection - - Data privacy are the regulations, or policies, that - governs the use of my data when shared with any - entity, while data protection is the mechanism — - that is, the tools and procedures — to enforce the - policy and regulation, including the prevention of - unauthorized access or misuse of the data that I - agreed to share - - Information Security x Privacy - - Information security and privacy are **closely related, - but distinct concepts** - - Privacy is :-> an individual’s right to control the use and - disclosure of their own personal information - - Information security is :-> the process used to keep - data private - - Security is the process; privacy is the result - - Trends and drivers of cybersecurity + - Cybercrime + - Cybercrime is an act that violates the law, by using + information and communication technology (ICT) to + either target networks, systems, data, websites + and/or technology or facilitate a crime - Key concepts - Risk management - LATER 概率论 (隔了一个周末)