“Intro to the Challenge of Cybersecurity – Unit 4 – Lesson 2”

Unit 4 – Lesson 2 – “Data – Principles”

1 Day

Data is misused in multiple ways. An adversary could “disclose” the data and reveal its contents to unauthorized people (breaching confidentiality). An adversary could alter the data without authorization and “deceive” authorized people (breaking integrity). And an adversary could “disrupt,” “destruct,” and “usurp,” the data, rendering it unavailable to people who are authorized to use it at all times (denying availability). This lesson addresses data security concerns and methods to overcome those concerns focusing on confidentiality, integrity, and availability.