# Module 2: Introduction
# Summary
This module is an introduction to the topic of data security. Data need to be of integrity, available, and confidential to be of value (CIA triad). In addition, they often need to be of utility, possession, and authenticity.
# Learning Goals
- Learn under which circumstances data security is given
- Know the different methods how data security is obtained
# Table of Contents
- [Access Control](https://osf.io/qukj4/wiki/Module%202%2C%20Part%202:%20Access%20Control/)
- [Cryptography](https://osf.io/qukj4/wiki/Module%202%2C%20Part%204:%20Cryptography/)
- [Data Integrity](https://osf.io/qukj4/wiki/Module%202%2C%20Part%203:%20Data%20Integrity/)
# Presentation Slides
Example presentation slides for this module can be found [here](https://osf.io/7p58w).