PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level

KSh 13,000.00

This book contains the following topics:

Part A: Information Asset Security and Control
• 5.1 Information Asset Security Policies, Frameworks, Standards and Guidelines
• 5.2 Physical and Environmental Controls
• 5.3 Identify and Access Management
• 5.4 Network and Endpoint Security
• 5.5 Data Loss Prevention
• 5.6 Data Encryption
• 5.7 Public Key Infrastructure
• 5.8 Cloud and Virtualized Environments
• 5.9 Mobile, Wireless and Internet of Things Devices
Part B: Security Event Management
• 5.10 Security Awareness Training and Programs
• 5.11 Information System Attack Methods and Techniques
• 5.12 Security Testing Tools and Techniques
• 5.13 Security Monitoring Logs, Tools and Techniques
• 5.14 Security Incident Response Management
• 5.15 Evidence Collection and Forensics
Case Study

Category: International Level Book
Publisher: Finstock Evarsity Publishers
ISBN:
Authors: CPA John Kimani, Dr. James Scott
Pages: 328
Categories: ,

Description

The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).

WhatsApp us now!