INFS 420

Handouts

The CIA Triad and the Five Pillars of Information Assurance Security Demo Using Frames Threat Actors and Characteristics Access Control Access Control Schemes Authentication Credentials Business Continuity Cloud Computing Cloud Computing Functional Areas Cloud Models Cybersecurity Resources Endpoint Attacks Firewalls Incident Response Plan Intrusion Detection and Prevention Systems Network Attacks Penetration Testing Security Policies Recipe for an Attack Risk Virtualization VPN: Virtual Private Networks Vulnerability Scanning