ICT 351 Lecture Notes - Lecture 3: Data Theft, Scada, Critical Infrastructure

13 views4 pages

Document Summary

Information security (tasks of protecting the data while it is being processed or stored or transmitted) Tasks of guarding digital information, typically processed by a computer, stored on a storage device. Ensures that protective measures are properly implemented. Involves more than protecting the information itself. Preemptive measures (strike them before they strike you) Avoids legal consequences of not securing information. Each organization will need to define what a computer security incident is. Any real or suspected adverse event related to the security of computer systems or computer networks or. The act of violating an explicit or implied security policy. Ex: attempts to gain unauthorized access to a system or its data, unwanted disruption or denial of service, the unauthorized use of a system for the processing or storage of data, etc . Critical information infrastructures (what is the relevance to this?)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents