Information Security : Includes all type of info and knowledge such as documents or voice info
IT Security : info regarding the hardware and software such as servers and networks
Cybersecurity : Every type of info that you can access using the internet
Protects sensitive information from unauthorized access through encryption, access controls, and secure practices.
3 States of data:
Ensures data remains accurate and unaltered, using checksums, digital signatures, and access controls to prevent unauthorized changes.
Guarantees that systems and data are accessible to authorized users when needed, through redundancy, failover mechanisms, and robust infrastructure.
is an accomplishment or experience that significantly enhances one's qualifications and is worth highlighting on a resume. (IT CAN BE GOOD OR BAD but mostly BAD)