In this chapter, you will learn to
• Appreciate the evolution from information security to cybersecurity
• Recognize application of information confidentiality, integrity, and availability
• Understand fundamental cybersecurity terms
• Explain data encryption and identity access management
• Become familiar with information assurance practices such as business continuity and systems recovery
Some people who read this book will already have years of experience in information technology or security. Some may even have certifications such as CISSP (Certified Information Systems Security Professional) or CISA (Certified Information ...