Course Learning Objectives
1.
After
completing this section, you should be able to:
2.
Identify
requirements of the organizational security policies.
3.
Recognize
the three levels of security.
4.
Recognize
proper security safeguards.
5.
After
completing this section, you should be able to:
6.
Recognize
the different lines of defense for a computer system.
7.
Identify
environmental considerations as they apply to computer security.
8.
Recognize
the components of a maintenance log.
9.
Identify
computer access controls for software and data files.
10.
Identify
some of the most common hardware problems.
11.
Identify
how data integrity may be threatened.
12.
Recognize
some hardware security devices used to protect the computer system.
13.
Identify
top security related products in use.
14.
Recognize
different types of viruses and security threats.
15.
Recognize
the uses of firewall security systems.
16.
Identify
prerequisites for sensitive personnel positions.
17.
Recognize
the value of an employee performance evaluation system and components of a
training system.
18.
Identify
security issues posed by terminated employees.
19.
Recognize
network tools used to implement security plans.
20.
Identify
the tools and techniques used by saboteurs.
21.
Identify
questions that policy makers should answer when designing a security system.
22.
Recognize
activities conducted as part of the risk analysis and management.
23.
Recognize
human factor threats for security.
24.
Recognize
the types of disruptions in computer processing.
25.
Recognize
components of a contingency plan.
26.
Identify
fire safety preventive plans.
27.
Identify
the scope of internal and external security auditing.
28.
Recognize
the audit trail to identify unusual activities.
29.
Recognize
control techniques.
30.
Identify
EDI security risks.
31.
Recognize
penalties of the US Computer Fraud and Abuse Act.
32.
Identify
major issues regarding computer crimes and privacy issues.
33. Identify new certificate programs
in computer security.