Loading...

Principle of Adequate Data Protection

In this module we apply principle of least privileges for controlling the proper access given to users and system process. We will demonstrate such an access control by using an example of project document access control using the Unix file access mechanism. We use OPM data breach example to show the impact and the need for principle of adequate data protection. Trust is critical and in the center of any secure systems. We will examine the source and authenticity of the programs and data installed in systems we used daily and show the proper way to check their integrity, and verify their authenticity.

About Coursera

Courses, Specializations, and Online Degrees taught by top instructors from the world's best universities and educational institutions.

Community
Join a community of 40 million learners from around the world
Certificate
Earn a skill-based course certificate to apply your knowledge
Career
Gain confidence in your skills and further your career