Data Protection and Security |
|||||
I |
Introduction to Information Security |
||||
Course Introduction |
|||||
Click here to view course introduction [video].
|
|||||
Chapter Objectives |
|||||
This opening chapter aims to give a basic understanding of main concepts in information security supplemented with interesting practical examples. |
|||||
I.I |
Definitions |
||||
This section gives the definitions of main security concepts, main difficulties of obtaining security and main measures of security are mentioned. [more] |
|||||
Sessions: [1] [2] [3] [4] [5] [6] | |||||
I.II |
Common Information Security Targets |
||||
Common targets of information security are explained, 'authentication', 'authorization', 'privacy' and 'anonymity' concepts are introduced. [more] |
|||||
Sessions: [1] [2] [3] [4] [5] [6] | |||||
I.III |
Security Management and Policies |
||||
Basic security management concepts are described. [more] |
|||||
Sessions: [1] | |||||
I.IV |
Principles of Security |
||||
Six principles of security are introduced. Practical applications of the principles are discussed. [more] |
|||||
Sessions: [1] [2] [3] [4] [5] [6] [7] [8] | |||||
I.V |
Summary |
||||
A brief summary of the chapter is provided. [more] |
|||||
Sessions: [1] | |||||
|
|||||