Description should include
- system security (i.e., ensuring information is transmitted according to approved protocol)
- electronic courtesy (i.e., ensuring the rules of network etiquette are followed)
- confidentiality (i.e., ensuring through technology that information remains private and secure).
- technological integrity (i.e., verifying the source of information and ensuring that information on a user’s screen is the same as what was sent)
- availability (i.e., ensuring that data/information remains available and intact).
Process/Skill Questions:
- With regard to cybersecurity, what does CIA stand for?
- What does availability mean with regard to cybersecurity?
- Why is data integrity important?