From the course: Penetration Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Information security

Information security

- [Instructor] "Information Security Controls, Laws, and Standards." In this module, we're going to talk about just that, Security Controls, Laws, and Standards that you should be aware of for the CEH exam. So let's get started. Information Security Controls are the safeguards or measures implemented to minimize cyber risk and detect and counteract information security threats to an organization. So leaks could be risks like data exfiltration, information breaches, or unauthorized access. Information Security Controls are what help us protect the CIA triad of the Information Security. Now, we're going to cover a lot of different terms in this module. So let's first start speaking about the Information Assurance or IA. Now, IA depends on the integrity, availability, and confidentially and authenticity. Combining these components guarantees the assurance of information and information systems and their protection, while we're using, storing, or communicating information and data. Now…

Contents