Chapter 1
Chapter 1
What is Cybersecurity?
Medical Records
Education Records
Traditional Data
Confidentiality
Integrity
Availability
In this lab, you will generate a hash for a file and use
the hash value to compare the integrity of a file.
The Consequences of a Security Breach
Types of Attackers