Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Now we'll move on to Integrity aspect of security as a means of testing modification of information. We'll discuss what audit logs tell us, and tools such as Message Digest (Hash), message authentication code (MAC) and Digital Signature –that verify modification. And finally we discuss the last tenant of security, Availability. You'll learn the differences between Denial of Service (DoS) and Distributed Denial of Service (DD0S) and why they are effective in compromising availability. You'll learn why free software off the internet is NOT really free, how it can impact the availability of systems, and why educating users the importance of NOT downloading free software is critical to keeping a network secure and its resources available.