Chapter 17 resources for the Cyberlaw bookResources and Links for the book Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler

By John Bandler

This page has resources specific for this chapter.

Looking to navigate to another place?

Chapter 17: Cybersecurity introduced

Chapter references, resources, and additional reading

Chapter questions

  • Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
  • What is the difference between information security and cybersecurity?
  • List the three information security objectives (CIA)
  • Briefly summarize the three information security objectives (CIA)
  • List the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
  • Briefly summarize the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
  • What is authentication in context of computers?
  • List the three factors of authentication (and give an example of each).
  • What is two factor authentication?
  • Why should we employ two-factor authentication on email and other important cloud and internet accounts?

Links and information

This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch17, copyright John Bandler, all rights reserved.

Originally posted 11/20/2024.  Updated 12/04/2024.