Auto saved by Logseq
This commit is contained in:
parent
614dca0687
commit
ec06e35ed6
|
@ -2192,15 +2192,8 @@
|
||||||
systems, networks and technologies
|
systems, networks and technologies
|
||||||
- Trends and drivers of cybersecurity
|
- Trends and drivers of cybersecurity
|
||||||
- Information Security
|
- Information Security
|
||||||
- Information Security x Privacy
|
- Definition: Seeks to protect all information assets, whether in
|
||||||
collapsed:: true
|
hard copy or in digital form
|
||||||
- Information security and privacy are **closely related,
|
|
||||||
but distinct concepts**
|
|
||||||
- Privacy is :-> an individual’s right to control the use and
|
|
||||||
disclosure of their own personal information
|
|
||||||
- Information security is :-> the process used to keep
|
|
||||||
data private
|
|
||||||
- Security is the process; privacy is the result
|
|
||||||
- Privacy and Data Protection
|
- Privacy and Data Protection
|
||||||
collapsed:: true
|
collapsed:: true
|
||||||
- Data privacy are the regulations, or policies, that
|
- Data privacy are the regulations, or policies, that
|
||||||
|
@ -2210,13 +2203,24 @@
|
||||||
policy and regulation, including the prevention of
|
policy and regulation, including the prevention of
|
||||||
unauthorized access or misuse of the data that I
|
unauthorized access or misuse of the data that I
|
||||||
agreed to share
|
agreed to share
|
||||||
- Seeks to protect all information assets, whether in
|
- Information Security x Privacy
|
||||||
hard copy or in digital form
|
collapsed:: true
|
||||||
|
- Information security and privacy are **closely related,
|
||||||
|
but distinct concepts**
|
||||||
|
- Privacy is :-> an individual’s right to control the use and
|
||||||
|
disclosure of their own personal information
|
||||||
|
- Information security is :-> the process used to keep
|
||||||
|
data private
|
||||||
|
- Security is the process; privacy is the result
|
||||||
- Cybercrime
|
- Cybercrime
|
||||||
- Cybercrime is an act that violates the law, by using
|
- Cybercrime is an act that violates the law, by using
|
||||||
information and communication technology (ICT) to
|
information and communication technology (ICT) to
|
||||||
either target networks, systems, data, websites
|
either target networks, systems, data, websites
|
||||||
and/or technology or facilitate a crime
|
and/or technology or facilitate a crime
|
||||||
|
- Drivers of Cybersecurity
|
||||||
|
- Legal and regulatory
|
||||||
|
- Commercial
|
||||||
|
- Technical
|
||||||
- Key concepts
|
- Key concepts
|
||||||
- Risk management
|
- Risk management
|
||||||
- LATER 概率论 (隔了一个周末)
|
- LATER 概率论 (隔了一个周末)
|
||||||
|
|
Loading…
Reference in a new issue