Chapter 8. Protection of Assets
The following exam domain is partially covered in this chapter:
Domain 5—Protection of Information Assets
This chapter covers the following topics:
Access Control: Controlling who has access and how that access occurs is one of the first lines of defense in protecting an organization’s assets.
Security Controls for Hardware and Software: Security controls are used to protect critical asserts and can deter, delay, prevent, and detect unauthorized access attempts.
Protection of Information Assets: One of the keys ...
Get Certified Information Systems Auditor (CISA) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.