Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURING INFORMATION SYSTEMS (THE COMPONENTS OF AN ORGANIZATIONAL…
SECURING INFORMATION SYSTEMS
INFORMATION SYSTEMS VULNERABLE TO DESTRUCTION, ERROR AND ABUSE
SYSTEMS ARE VULNERABLE
MALICIOUS SOFTWARE: VIRUSES,WORMS, TROJAN, HORSES AND SPYWARE
HACKERS AND COMPUTER CRIME
INTERNAL THREATS: EMPLOYEES
SOFTWARE VULNERABILITY
THE BUSINESS VALUE OF SECURING AND CONTROL
LEGAL AND REGULATORY REQUIREMENTS FOR ELECTRONIC RECORDS MANAGEMENT
ELECTRONIC EVIDENCE AND COMPUTER FORENSICS
THE COMPONENTS OF AN ORGANIZATIONAL FRAMEWORK FOR SECURITY AND CONTROL
INFORMATION SYSTEMS CONTROLS
RISK ASSESSMENT
SECURITY POLICY
DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING
THE ROLE OF AUDITING
SECURING WIRELESS NETWORKS
ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE
ENSURING SYSTEM AVAILABILITY
SECURING ISSUES FOR CLOUD COMPUTING AND THE MOBILE DIGITAL PLATFORM
ENSURING SOFTWARE QUALITY