Identify concepts of cybersecurity and cyber forensics, honesty, and confidentiality related to information systems (e.g., spam, malicious software).
Identification should include a list of items related to
- system security (i.e., ensuring information is transmitted according to approved protocol)
- technological integrity (i.e., verifying the source of information and ensuring information on a user’s screen is the same as what was sent)
- confidentiality (i.e., ensuring through technology that information remains private and secure).