{"id":328,"date":"2015-08-03T18:57:35","date_gmt":"2015-08-03T18:57:35","guid":{"rendered":"https:\/\/courses.candelalearning.com\/computerapps\/?post_type=chapter&#038;p=328"},"modified":"2016-05-06T18:02:33","modified_gmt":"2016-05-06T18:02:33","slug":"video-basic-principles-of-computer-security","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/chapter\/video-basic-principles-of-computer-security\/","title":{"raw":"Video: Basic Principles of Computer Security","rendered":"Video: Basic Principles of Computer Security"},"content":{"raw":"Watch this video to learn about the basic principles of computer security:\r\n<ol>\r\n\t<li>Protect against non-desired changes<\/li>\r\n\t<li>Assure privacy<\/li>\r\n\t<li>Guarantee access to resources<\/li>\r\n\t<li>Know who and what happened in a transaction<\/li>\r\n<\/ol>\r\nhttps:\/\/youtu.be\/UPmVTPyE5DM","rendered":"<p>Watch this video to learn about the basic principles of computer security:<\/p>\n<ol>\n<li>Protect against non-desired changes<\/li>\n<li>Assure privacy<\/li>\n<li>Guarantee access to resources<\/li>\n<li>Know who and what happened in a transaction<\/li>\n<\/ol>\n<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"Information security: Anish Bhimani at TEDxUConn 2013\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/UPmVTPyE5DM?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-328\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">All rights reserved content<\/div><ul class=\"citation-list\"><li>Information security: Anish Bhimani at TEDxUConn 2013. <strong>Authored by<\/strong>: TEDx Talks. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/youtu.be\/UPmVTPyE5DM\">https:\/\/youtu.be\/UPmVTPyE5DM<\/a>. <strong>License<\/strong>: <em>All Rights Reserved<\/em>. <strong>License Terms<\/strong>: Standard YouTube License<\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":74,"menu_order":10,"template":"","meta":{"_candela_citation":"[{\"type\":\"copyrighted_video\",\"description\":\"Information security: Anish Bhimani at TEDxUConn 2013\",\"author\":\"TEDx Talks\",\"organization\":\"\",\"url\":\"https:\/\/youtu.be\/UPmVTPyE5DM\",\"project\":\"\",\"license\":\"arr\",\"license_terms\":\"Standard YouTube License\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-328","chapter","type-chapter","status-publish","hentry"],"part":307,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/users\/74"}],"version-history":[{"count":4,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/328\/revisions"}],"predecessor-version":[{"id":1419,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/328\/revisions\/1419"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/parts\/307"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/328\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapter-type?post=328"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/contributor?post=328"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/license?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}