Table
of Contents
Chapter
1 Organizational Policy
Establishing
a Security Policy
Chapter
2 Physical Security and Data Preservation
Software
and Devices for Physical Security
Click
here to see Answers to Review Questions at end of EBook.
Intrusion
Prevention Systems (IPS)
Click
here to see Answers to Review Questions at end of EBook.
Illegal
Access and Use - Hacking
Public/Private
Key Technology in Online Trading
What
is a Public Key Infrastructure (PKI)?
Doing
Business over the Internet
Click
here to see Answers to Review Questions at end of EBook.
Click
here to see Answers to Review Questions at end of EBook.
Considerations
in Designing Networks
Vulnerability
Testing Using Automated Tools
Protecting
Your Networks from Ransomware
Click
here to see Answers to Review Questions at end of EBook.
Creating
the Policy and the Plan
Chapter
8 Contingency Planning
Mobile
Device Security and Contingency Planning
The
Contingency Planning Committee.
Click
here to see Answers to Review Questions at end of EBook.
Chapter
9 Auditing and Legal Issues
EDI
and Electronic Contracting
Legal
Liability in Security Management
Click
here to see Answers to Review Questions at end of EBook.
Chapter
10 Computer Crime, Cyberfraud, and Recent Trends
CPASelfstudy.com
Course Evaluation