Table of Contents

Course Learning Objectives. 5

Chapter 1 Organizational Policy. 13

Learning Objectives: 13

Introduction. 13

Organizational Policy. 14

Security Administration. 16

Establishing a Security Policy. 18

The Security Administrator. 20

Final Consideration. 20

Chapter 1 Review Questions. 21

Chapter 2 Physical Security and Data Preservation. 22

Learning Objectives: 22

Computer Facilities. 22

Environmental Considerations. 23

Protecting Information. 26

Controlling Access. 26

Hardware Security. 28

Software and Devices for Physical Security. 30

Chapter 2 Review Questions. 32

Click here to see Answers to Review Questions at end of EBook. 32

Chapter 3 Hardware Security. 33

Learning Objectives: 33

Physical Security. 34

Data Integrity. 34

Deploying a Security System.. 36

VPN Solution. 36

Smart Cards. 37

eToken. 38

Biometrics. 39

Intrusion Prevention Systems (IPS). 43

Laptop Security. 44

Summary. 45

Chapter 3 Review Questions. 46

Click here to see Answers to Review Questions at end of EBook. 46

Chapter 4 Software Security. 47

Learning Objectives: 47

Security Breaches. 47

What is a Virus?. 50

Illegal Access and Use - Hacking. 52

Ransomware. 54

What is a Firewall?. 55

What is Authentication?. 60

What is Encryption?. 60

Public/Private Key Technology in Online Trading. 64

What is Digital Signature?. 65

What is a Public Key Infrastructure (PKI)?. 66

What is Kerberos?. 66

What is Pretty Good Privacy?. 66

What was the Orange Book?. 66

Internet Security Market 67

Security Protocols. 67

What is VPN?. 69

Doing Business over the Internet 69

E-mail Security. 70

Hacked Email 74

Summary. 75

Chapter 4 Review Questions. 77

Click here to see Answers to Review Questions at end of EBook. 77

Chapter 5 Personnel Security. 78

Learning Objectives: 78

Screening. 78

Legal Agreements. 80

Training New Employees. 80

Performance Appraisal 81

Exit Procedures. 81

Chapter 5 Review Questions. 83

Click here to see Answers to Review Questions at end of EBook. 83

Chapter 6 Network Security. 84

Learning Objectives: 84

Passwords. 85

Saboteur's Tools. 87

Considerations in Designing Networks. 88

Secure Sockets Layer. 95

Firewalls. 97

Pretty Good Privacy (PGP). 100

Vulnerability Testing Using Automated Tools. 102

Protecting Your Networks from Ransomware. 104

Conclusion. 107

Chapter 6 Review Questions. 108

Click here to see Answers to Review Questions at end of EBook. 108

Chapter 7 Security Policy. 109

Learning Objectives: 109

Managing Computer Security. 109

Creating the Policy and the Plan. 110

Risk Analysis and Management 113

The Security Administrator. 114

The Human Factor. 114

Account Administration. 116

Conclusion. 118

Chapter 7 Review Questions. 119

Chapter 8 Contingency Planning. 120

Learning Objectives: 120

The Role of Senior Management 121

Mobile Device Security and Contingency Planning. 121

The Contingency Planning Committee. 123

Areas to Cover. 123

Fire Safety. 131

Insurance. 134

Conclusion. 134

Chapter 8 Review Questions. 136

Click here to see Answers to Review Questions at end of EBook. 136

Chapter 9 Auditing and Legal Issues. 137

Learning Objectives: 137

Security Auditing. 137

Audit Trail 139

EDI and Electronic Contracting. 140

Auditing Contingency Plans. 143

Controls. 143

Audit Software. 144

Legal Liability in Security Management 145

Chapter 9 Review Questions. 148

Click here to see Answers to Review Questions at end of EBook. 148

Chapter 10 Computer Crime, Cyberfraud, and Recent Trends. 149

Learning Objectives: 149

Computer Crime. 149

Privacy Issues. 152

Tools of Security Management 154

Other Security Measures. 156

Cloud Computing. 162

FTC - Computer Security.. 163

Chapter 10 Review Questions. 165

Review Question Answers. 166

Glossary. 185

Index. 188

CPE Exam Answer Sheet 189

Final Examination. 191

CPASelfstudy.com Course Evaluation. 199