Auto saved by Logseq
This commit is contained in:
parent
4686b767f1
commit
614dca0687
|
@ -2190,26 +2190,33 @@
|
||||||
- Objective :-> It aims to reduce the risk of cyber attacks, and
|
- Objective :-> It aims to reduce the risk of cyber attacks, and
|
||||||
protect against the unauthorised exploitation of
|
protect against the unauthorised exploitation of
|
||||||
systems, networks and technologies
|
systems, networks and technologies
|
||||||
|
- Trends and drivers of cybersecurity
|
||||||
- Information Security
|
- Information Security
|
||||||
|
- Information Security x Privacy
|
||||||
|
collapsed:: true
|
||||||
|
- Information security and privacy are **closely related,
|
||||||
|
but distinct concepts**
|
||||||
|
- Privacy is :-> an individual’s right to control the use and
|
||||||
|
disclosure of their own personal information
|
||||||
|
- Information security is :-> the process used to keep
|
||||||
|
data private
|
||||||
|
- Security is the process; privacy is the result
|
||||||
|
- Privacy and Data Protection
|
||||||
|
collapsed:: true
|
||||||
|
- Data privacy are the regulations, or policies, that
|
||||||
|
governs the use of my data when shared with any
|
||||||
|
entity, while data protection is the mechanism —
|
||||||
|
that is, the tools and procedures — to enforce the
|
||||||
|
policy and regulation, including the prevention of
|
||||||
|
unauthorized access or misuse of the data that I
|
||||||
|
agreed to share
|
||||||
- Seeks to protect all information assets, whether in
|
- Seeks to protect all information assets, whether in
|
||||||
hard copy or in digital form
|
hard copy or in digital form
|
||||||
- Privacy and Data Protection
|
- Cybercrime
|
||||||
- Data privacy are the regulations, or policies, that
|
- Cybercrime is an act that violates the law, by using
|
||||||
governs the use of my data when shared with any
|
information and communication technology (ICT) to
|
||||||
entity, while data protection is the mechanism —
|
either target networks, systems, data, websites
|
||||||
that is, the tools and procedures — to enforce the
|
and/or technology or facilitate a crime
|
||||||
policy and regulation, including the prevention of
|
|
||||||
unauthorized access or misuse of the data that I
|
|
||||||
agreed to share
|
|
||||||
- Information Security x Privacy
|
|
||||||
- Information security and privacy are **closely related,
|
|
||||||
but distinct concepts**
|
|
||||||
- Privacy is :-> an individual’s right to control the use and
|
|
||||||
disclosure of their own personal information
|
|
||||||
- Information security is :-> the process used to keep
|
|
||||||
data private
|
|
||||||
- Security is the process; privacy is the result
|
|
||||||
- Trends and drivers of cybersecurity
|
|
||||||
- Key concepts
|
- Key concepts
|
||||||
- Risk management
|
- Risk management
|
||||||
- LATER 概率论 (隔了一个周末)
|
- LATER 概率论 (隔了一个周末)
|
||||||
|
|
Loading…
Reference in a new issue