O'Reilly logo

CISA® Certified Information Systems Auditor™ Study Guide, Second Edition by David L. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Information Asset Protection

THE OBJECTIVE OF THIS CHAPTER IS TO ACQUAINT THE READER WITH THE FOLLOWING CONCEPTS:

  • Threats to security, perpetrators, and attack methods

  • Administrative management controls used to promote security

  • Implementing data classification schemes to specify appropriate handling of records

  • Physical security protection methods

  • Perimeter security designs, firewalls, and intrusion detection

  • Logical access controls for identification, authentication, and restriction of users

  • Changes in wireless security, including the robust security network

  • Encryption systems using symmetric and asymmetric public keys

  • Dealing with malicious software, viruses, worms, and other attacks

  • Storage, retrieval, transport, and disposition of confidential ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required