Updating search results...

Search Resources

5 Results

View
Selected filters:
  • data-security
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Towards Better Research Data Curation.pptx
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This is a slide for the upcoming workshop on research data curation for HKU researchers. It covers topics on the concept and importance of data curation, "FAIR" principles, data curation practices using DMPTool, Dublin Core and Github, and security issues for research data management, including secure storage and privacy.

Subject:
Applied Science
Information Science
Material Type:
Interactive
Author:
Rui Yao
Date Added:
03/29/2023
The growing role of AI and ML in Data Security
Unrestricted Use
CC BY
Rating
0.0 stars

 The organizations that depend largely on collecting data from various sources or are highly digitized must adopt data security. It is better to fight the risks at the initial stage than to regret the loss of data and face the consequences. If the information can not be kept safe from various attacks then the preference of the organization will decrease eventually. Even if personal information cannot be trusted in the hands of the organization then there will be dissatisfaction among customers. If an organization is unable to keep its customers satisfied then its value can hit rock bottom. Hence, by using Artificial Intelligence and Machine Learning the data security should be made better. These technologies will also help in decreasing the extra effort that has to be put by an organization and its employees.  

Subject:
Computer Science
Information Science
Marketing
Material Type:
Reading
Student Guide
Author:
Amelia Emma
Date Added:
01/09/2020