Mind Map Information Security (Chapter 1)
Mind Map Information Security (Chapter 1)
Mind Map Information Security (Chapter 1)
Integrity
designed to protect data EXAMPLE OF
from deletion or
modification from an
CHARACTERISTIC IMPLEMENTATIO Lock system on
OF CIA Safe box
unauthorized party and N CIA IN REAL
only authorized person ENVIRONMENT
can edit and remains in
its original state when at
rest. Availability
Authentication mechanisms,
access channels and system all Fingerprint
have to work properly for the Biometric system
information they protect and on smartphone
ensure it’s available when it is
2 needed.
Type Of Security Model Simple password
Example: hardware
OPEN SECURITY (router, switch)
AI-powered chatbots
Technical Problem
manipulate information
POTENTIAL RISK IN
INFORMATION SECURITY
4