George Mason University: Paul A. Strassman's "Information Assurance for Defense Security"
Watch this lecture to learn about the methods for managing risks to information assets. IT practitioners seek to protect the confidentiality, integrity, and availability of data and their delivery systems - whether the data are in storage, in processing, or in transit, and whether threatened by malice or accident.
Last modified: Thursday, July 28, 2016, 9:46 AM