WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: Computer and Network Security Overall ITEC260 & ITEC360, Availability of Network Infrastructure, Computer and Network Security is necessary to guarantee Integrity, Integrity of Data, Integrity of Hosts, Computer and Network Security is necessary to guarantee Confidentiality, Computer and Network Security applies to Network Infrastructure, Computer and Network Security applies to Hosts, Attacks can jeopardize Confidentiality, Computer and Network Security may be realized through a combination of Precautionary measures, Network Infrastructure includes Hardware, Hosts as connected by Network Infrastructure, Precautionary measures to prevent Vulnerabilities, Integrity of Network Infrastructure, Data as transmitted across Network Infrastructure, Attacks exploit Vulnerabilities, Hosts might present Vulnerabilities, Computer and Network Security is necessary to guarantee Availability, Availability of Data, Network Infrastructure might present Vulnerabilities, Hosts includes Applications