This website uses cookies to ensure you get the best experience on our website.
Privacy Policy
OK
Wisc-Online Arcade Logo
Toggle navigation
Learn
Games
Play Games
Build Games
Courses
Image Library
Search
User Profile
Sign Up
Sign In
Sign In
Sign Up
Introduction to Information Security
|
See more in
Information Technology
You'll become familiar with basic information security terms.
By
Baeten
Created Date 03.26.15
Last Updated 03.26.15
Viewed 149 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
Download text-based alternate version
Tweet
Vote Up
Vote Down
151
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
You need to be logged in to use this feature.
Log In
or
Register
Topics of this game:
Part of the CIA acronym for information protection. Only approved individuals may access information.
Part of the CIA acronym for information protection. Information is correct and unaltered
Part of the CIA acronym for information protection. Information is accessible to authorized users.
Part of the AAA acronym to secure information. A way to verify individuals are who they say they are.
Part of the AAA acronym to secure information. The ability to grant access to information.
Part of the AAA acronym to secure information. The ability to provide a means of tracking events.
Forms the physical security around data. It might be a door lock or network security equipment.
Those who implement and properly use security products to protect data.
Plans and policies established by an organization to ensure people correctly use products.
Questions
Feedback
Ask a Question
New Question
Cancel
|
Save
Start a new Discussion
New Discussion
Cancel
|
Save