INFS 420
Handouts
The CIA Triad and the Five Pillars of Information Assurance
Security Demo Using Frames
Threat Actors and Characteristics
Access Control
Access Control Schemes
Authentication Credentials
Business Continuity
Cloud Computing
Cloud Computing Functional Areas
Cloud Models
Cybersecurity Resources
Endpoint Attacks
Firewalls
Incident Response Plan
Intrusion Detection and Prevention Systems
Network Attacks
Penetration Testing
Security Policies
Recipe for an Attack
Risk
Virtualization
VPN: Virtual Private Networks
Vulnerability Scanning