Confidentiality 機密性
Integrity 完整性
Availability 可用性
Identify 識別 :
Protect 防護
Detect 偵測
Response 回應
Recover 復原
What are the motivations of hackers?
Use a mind map to organize your understanding of the CIA triad (Confidentiality, Integrity, and Availability). Be prepared to share your mind map with the class.
Use the toll payment case under SSL course section to address possible attacks on CIA