Skip To Content

Athabasca University

Section 3: Information Security

This section describes the need for information security, the threats that exist, and the methods and tools for protecting and securing information and information systems.

Section Objectives

After completing this section, you will be able to

  1. List and describe threats and defenses to information security.
  2. Define and describe the processes of authentication and authorization.
  3. List and describe network-specific threats.
  4. Define encryption and give examples of it.
  5. Provide some examples of simple encryption algorithms.

Required Reading

Chapter 8 in the textbook

Discussion Forum

The topic for Unit Three, Section 3 is Challenge Work 2 on page 419 of the text.

Updated August 26 2015 by FST Course Production Staff