Coverage of Information System Security Issues
Enterprise-wide security organizational and policy issues
Logical Access Issues and Exposures
- Authentication Techniques
- Programs, Files, & System Resources to Protect
- Monitoring Activities
- Encompasses both Host & Network Based Systems
- Internet issues and protection mechanisms addressed
Physical Access Issues and Exposures