3.2+Security

=Security issues=

//Before you begin//: Lessons are based on community-based, continually updated online sources such as [|Wikipedia]. Relevant terms for this lesson are listed under Topics and presented in a narrative format in the Read about sections. Click on each of the linked items and visit the Wikipedia article to get the most out of the lesson, and then hit the Back button on your browser to return to the lesson.

toc

=Goals=
 * Basic**
 * Advanced**
 * Advanced**

=Topics= [|backup], [|data redundancy] , [|confidentiality] , [|information security] , [|Health Insurance Portability and Accountability Act] (HIPAA), [|authentication] , [|password] , [|biometrics] , [|audit trails] , [|encryption and decryption] , [|certificate of authority], [|firewall] , [|secure sockets layer (SSL) and transport layer security (TLS)], [|computer security]

=Read about= the essay you do tying the links into a story or "context"

=Activities= (this needs some work)

=Online Resources=
 * Jerome H. Saltzer and Michael D. Schroeder. Read Section I of [|The protection of information in computer systems] . Proceedings of the IEEE, 1 September 1975.

=Questions= (we can keep this blank for now)

=Advanced courses= Ronald L. Rivest. Course materials for 6.857 [|Network and Computer Security, Fall 2003]. MIT OpenCourseWare, Massachusetts Institute of Technology.

=Expert corner= Help with Wikipedia article(s):

flat

This page was last modified by user:{$revisioneditor} on {$revisiondate}.