Digital & Computing
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
...changed by authorised people or processes (integrity) be available to read and use whenever we want (availability). Often, these properties are represented as a ‘triad’ (see Figure 2). [This diagram demonstrates the three pillars of information security in the 'CIA triad'.] Figure 3 The CIA triad It is important to be able to distinguish between these three aspects of...
Level 1: Introductory
24 hrs