Identification should include a list of items related to
- system security (i.e., ensuring information is transmitted according to approved protocol)
- electronic courtesy (i.e., ensuring the rules of network etiquette are followed)
- confidentiality (i.e., ensuring through technology that information remains private and secure).
- technological integrity (i.e., verifying the source of information and ensuring that information on a user’s screen is the same as what was sent)
- availability (i.e., ensuring that data/information remains available and intact).
Process/Skill Questions:
- What does CIA (confidentiality, integrity, availability) stand for, with regard to cybersecurity?
- What does availability mean, with regard to cybersecurity?
- Why is data integrity important?