Skip to main content
Workforce LibreTexts

6: Information Systems Security

  • Page ID
  • Learning Objectives

    Upon completion of this chapter, you will be able to:

    We discuss the information security triad of confidentiality, integrity, and availability. We will review different types of threats and associated costs for individuals, organizations, and nations. We will discuss different security tools and technologies, how security operation centers can secure organizations’ resources and assets, and a primer on personal information security.

    • Was this article helpful?