This chapter discusses the need for security to guard information systems and data as well as technologies used secure information systems. Ask students what types of threats can harm an information system.
This chapter discusses the need for security to guard information systems and data as well as technologies used secure information systems. Ask students what types of threats can harm an information system.