This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Introduction to Information Security

| See more in Information Technology

You'll become familiar with basic information security terms.

TBaeten
By
Created Date 03.26.15
Last Updated 03.26.15
Viewed 148 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • Part of the CIA acronym for information protection. Only approved individuals may access information.
  • Part of the CIA acronym for information protection. Information is correct and unaltered
  • Part of the CIA acronym for information protection. Information is accessible to authorized users.
  • Part of the AAA acronym to secure information. A way to verify individuals are who they say they are.
  • Part of the AAA acronym to secure information. The ability to grant access to information.
  • Part of the AAA acronym to secure information. The ability to provide a means of tracking events.
  • Forms the physical security around data. It might be a door lock or network security equipment.
  • Those who implement and properly use security products to protect data.
  • Plans and policies established by an organization to ensure people correctly use products.