Auto saved by Logseq
This commit is contained in:
parent
614dca0687
commit
ec06e35ed6
|
@ -2192,31 +2192,35 @@
|
|||
systems, networks and technologies
|
||||
- Trends and drivers of cybersecurity
|
||||
- Information Security
|
||||
- Information Security x Privacy
|
||||
collapsed:: true
|
||||
- Information security and privacy are **closely related,
|
||||
but distinct concepts**
|
||||
- Privacy is :-> an individual’s right to control the use and
|
||||
disclosure of their own personal information
|
||||
- Information security is :-> the process used to keep
|
||||
data private
|
||||
- Security is the process; privacy is the result
|
||||
- Privacy and Data Protection
|
||||
collapsed:: true
|
||||
- Data privacy are the regulations, or policies, that
|
||||
governs the use of my data when shared with any
|
||||
entity, while data protection is the mechanism —
|
||||
that is, the tools and procedures — to enforce the
|
||||
policy and regulation, including the prevention of
|
||||
unauthorized access or misuse of the data that I
|
||||
agreed to share
|
||||
- Seeks to protect all information assets, whether in
|
||||
- Definition: Seeks to protect all information assets, whether in
|
||||
hard copy or in digital form
|
||||
- Privacy and Data Protection
|
||||
collapsed:: true
|
||||
- Data privacy are the regulations, or policies, that
|
||||
governs the use of my data when shared with any
|
||||
entity, while data protection is the mechanism —
|
||||
that is, the tools and procedures — to enforce the
|
||||
policy and regulation, including the prevention of
|
||||
unauthorized access or misuse of the data that I
|
||||
agreed to share
|
||||
- Information Security x Privacy
|
||||
collapsed:: true
|
||||
- Information security and privacy are **closely related,
|
||||
but distinct concepts**
|
||||
- Privacy is :-> an individual’s right to control the use and
|
||||
disclosure of their own personal information
|
||||
- Information security is :-> the process used to keep
|
||||
data private
|
||||
- Security is the process; privacy is the result
|
||||
- Cybercrime
|
||||
- Cybercrime is an act that violates the law, by using
|
||||
information and communication technology (ICT) to
|
||||
either target networks, systems, data, websites
|
||||
and/or technology or facilitate a crime
|
||||
- Drivers of Cybersecurity
|
||||
- Legal and regulatory
|
||||
- Commercial
|
||||
- Technical
|
||||
- Key concepts
|
||||
- Risk management
|
||||
- LATER 概率论 (隔了一个周末)
|
||||
|
|
Loading…
Reference in a new issue