Article Details
Retrieved on: 2024-07-15 18:37:57
Tags for this article:
Click the tags to see associated articles and topics
Summary
The article discusses the CIA triad in cybersecurity, highlighting confidentiality, integrity, and availability. Biometric verification is mentioned as a technique for maintaining confidentiality. Tags like 'Cryptography', 'Data security', and 'Computer security' connect to this concept.
Article found on: www.techtarget.com
This article is found inside other hiswai user's workspaces. To start your own collection, sign up for free.
Sign UpAlready have an account? Log in here