Data Protection and Security

   

I

Introduction to Information Security

   
       

 

Course Introduction

   

   
 

Click here to view course introduction [video].

Introduction Alternative for Video Introduction:

Some years ago, Abraham Maslow proposed a theory of human motivation. The main idea of his theory was that people are motivated to satisfy a variety of different needs and these needs tend to form a hierarchy in terms of importance. He argued that just after the base of the needs such as hunger and thirst, safety and security needs are the most fundamental. This theory provides useful insight why people spend so much effort, time and money to protect themselves and their physical belongings. In the information age we are living, data protection is no different with respect to its importance however sadly it is the least understood and the most overlooked one. This course is prepared to fill this gap and will teach you the fundamentals of data security and protection.

 

 

 

       

 

Chapter Objectives

   

   
 

This opening chapter aims to give a basic understanding of main concepts in information security supplemented with interesting practical examples.

 

 

 

       

I.I

Definitions

   

   
 

This section gives the definitions of main security concepts, main difficulties of obtaining security and main measures of security are mentioned. [more]

 

 

 

  Sessions: [1] [2] [3] [4] [5] [6]    
       

I.II

Common Information Security Targets

   

   
 

Common targets of information security are explained, 'authentication', 'authorization', 'privacy' and 'anonymity' concepts are introduced. [more]

 

 

 

  Sessions: [1] [2] [3] [4] [5] [6]    
       

I.III

Security Management and Policies

   

   
 

Basic security management concepts are described. [more]

 

 

 

  Sessions: [1]    
       

I.IV

Principles of Security

   

   
 

Six principles of security are introduced. Practical applications of the principles are discussed. [more]

 

 

 

  Sessions: [1] [2] [3] [4] [5] [6] [7] [8]    
       

I.V

Summary

   

   
 

A brief summary of the chapter is provided. [more]

 

 

 

  Sessions: [1]    
       
       
 
  proceed to first section »