Identify concepts of cybersecurity and cyber forensics, honesty, and confidentiality related to information systems (e.g., spam, malicious software).

Identification should include a list of items related to

  • system security (i.e., ensuring information is transmitted according to approved protocol)
  • technological integrity (i.e., verifying the source of information and ensuring information on a user’s screen is the same as what was sent)
  • confidentiality (i.e., ensuring through technology that information remains private and secure).