This whole time I thought it was the method used by the Central Intelligence Agency, not an acronym for Confidentiality, Integrity, and Availability. Though I don't doubt that they also use these principles.
My company is having a very big focus on educating the end-users. Some security trainings are obligatory, some other you can take voluntarily. If you do so, you receive badges that you can attach to your email signature which gives you a sense of a small achievment and promotes the idea across the organization. :)
Thank you for your efforts. I just want to confirm one thing: do you think biometrics and 2 factors authentication are mechanisms for confidentiality or authentication?
Yes, they are mechanisms for confidentiality because when implemented users can only access data or resources after authentication. Like you access your bank details.
Brief, clearly explained and to the point. Thank you!
Glad you enjoyed it!
O
This whole time I thought it was the method used by the Central Intelligence Agency, not an acronym for Confidentiality, Integrity, and Availability. Though I don't doubt that they also use these principles.
"its not the CIA your thinking of"
that's what they want you to think 0.o
Thank you. Very clear and concise.
Thanks for watching!
This was so crystal clear. Thank you for the video and kudos to great explanation.
You're very welcome! Glad you enjoyed it
the perfect and yeah, clear and to the point !!!
Thanks for watching!
Great explanation 👍🏻
Glad you liked it!
Thank you. Very helpful.
Glad it was helpful!
My company is having a very big focus on educating the end-users. Some security trainings are obligatory, some other you can take voluntarily. If you do so, you receive badges that you can attach to your email signature which gives you a sense of a small achievment and promotes the idea across the organization. :)
Thanks for sharing how your organization is encouraging CIA training!
good and simple explanation, just what we need to know.
Glad you think so!
Thank you for your efforts. I just want to confirm one thing: do you think biometrics and 2 factors authentication are mechanisms for confidentiality or authentication?
Yes, they are mechanisms for confidentiality because when implemented users can only access data or resources after authentication. Like you access your bank details.
Clear and to the point!
Glad you liked it!
How do u encrypt data