Search

Search Results

Results 1-2 of 2 (Search time: 0.002 seconds).
  • Previous
  • 1
  • Next
Item hits:
  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Upon completion of this material, you should be able to: List the key managerial roles and the main types of managerial positions in an organization. • Describe the POLC project management model. • List and describe organizational/structural approaches to information security. • Explain the difference between security policy, standard and procedure. • Enlist different types of security policy that can be found in an organization

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Define key terms and critical concepts of information security. • List the key challenges of information security, and key protection layers. • Describe the CNSS security model (McCumber Cube). • Be able to differentiate between threats and attacks to information. • Identify today's most common threats and attacks against information.