After reading this chapter and completing the exercises, you will be able to do the following:
Define the relationship between information security and personnel practices.
Recognize the stages of the employee lifecycle.
Describe the purpose of confidentiality and acceptable use agreements.
Understand appropriate security education, training, and awareness programs.
Create personnel-related ...