Event By
Date and Time
Location
Description
Communicating on the internet is like shouting across a crowded room: your message can be overheard by anyone who listens, not just the intended recipient. The study of information security includes methods to keep private messages secret, but also includes methods to prevent impersonation and ensure reliability. In this lecture, you’ll get an overview of three core facets of information security: the CIA triad (confidentiality, integrity and availability).