{"id":35594,"date":"2025-09-16T18:07:49","date_gmt":"2025-09-16T15:07:49","guid":{"rendered":"https:\/\/finstockevarsity.com\/resources\/?post_type=product&#038;p=35594"},"modified":"2025-09-16T18:07:50","modified_gmt":"2025-09-16T15:07:50","slug":"protection-of-information-assets-in-certified-information-systems-auditor-certificate-level","status":"publish","type":"product","link":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/","title":{"rendered":"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level"},"content":{"rendered":"<p>The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).<\/p>\n<div class=\"fb-background-color\">\n\t\t\t  <div \n\t\t\t  \tclass = \"fb-comments\" \n\t\t\t  \tdata-href = \"http:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/\"\n\t\t\t  \tdata-numposts = \"10\"\n\t\t\t  \tdata-lazy = \"true\"\n\t\t\t\tdata-colorscheme = \"light\"\n\t\t\t\tdata-order-by = \"social\"\n\t\t\t\tdata-mobile=true>\n\t\t\t  <\/div><\/div>\n\t\t  <style>\n\t\t    .fb-background-color {\n\t\t\t\tbackground: #ffffff !important;\n\t\t\t}\n\t\t\t.fb_iframe_widget_fluid_desktop iframe {\n\t\t\t    width: 100% !important;\n\t\t\t}\n\t\t  <\/style>\n\t\t  ","protected":false},"excerpt":{"rendered":"<p style=\"margin-top: 12.0pt;\"><span class=\"fontstyle0\">This book contains the following topics:<\/span><\/p>\n<p style=\"margin-top: 12.0pt;\">Part A: Information Asset Security and Control<br \/>\n\u2022 5.1 Information Asset Security Policies, Frameworks, Standards and Guidelines<br \/>\n\u2022 5.2 Physical and Environmental Controls<br \/>\n\u2022 5.3 Identify and Access Management<br \/>\n\u2022 5.4 Network and Endpoint Security<br \/>\n\u2022 5.5 Data Loss Prevention<br \/>\n\u2022 5.6 Data Encryption<br \/>\n\u2022 5.7 Public Key Infrastructure<br \/>\n\u2022 5.8 Cloud and Virtualized Environments<br \/>\n\u2022 5.9 Mobile, Wireless and Internet of Things Devices<br \/>\nPart B: Security Event Management<br \/>\n\u2022 5.10 Security Awareness Training and Programs<br \/>\n\u2022 5.11 Information System Attack Methods and Techniques<br \/>\n\u2022 5.12 Security Testing Tools and Techniques<br \/>\n\u2022 5.13 Security Monitoring Logs, Tools and Techniques<br \/>\n\u2022 5.14 Security Incident Response Management<br \/>\n\u2022 5.15 Evidence Collection and Forensics<br \/>\nCase Study<\/p>\n<table>\n<tbody>\n<tr>\n<td>Category:<\/td>\n<td>International Level Book<\/td>\n<\/tr>\n<tr>\n<td>Publisher:<\/td>\n<td><a href=\"https:\/\/finstockevarsity.com\/resources\/\">Finstock Evarsity Publishers<\/a><\/td>\n<\/tr>\n<tr>\n<td>ISBN:<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Authors:<\/td>\n<td>CPA John Kimani, Dr. James Scott<\/td>\n<\/tr>\n<tr>\n<td>Pages:<\/td>\n<td>328<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":35598,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"product_brand":[],"product_cat":[154,103],"product_tag":[],"class_list":{"0":"post-35594","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cisa","7":"product_cat-isaca","8":"product_shipping_class-require-shipping","10":"first","11":"instock","12":"downloadable","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources<\/title>\n<meta name=\"description\" content=\"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources\" \/>\n<meta property=\"og:description\" content=\"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/\" \/>\n<meta property=\"og:site_name\" content=\"Finstock Evarsity Resources\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/finstockevarsity\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T15:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2025\/09\/Front-20.png\" \/>\n\t<meta property=\"og:image:width\" content=\"577\" \/>\n\t<meta property=\"og:image:height\" content=\"869\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@evarsity\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/\",\"name\":\"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Front-20.png?fit=577%2C869&ssl=1\",\"datePublished\":\"2025-09-16T15:07:49+00:00\",\"dateModified\":\"2025-09-16T15:07:50+00:00\",\"description\":\"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Front-20.png?fit=577%2C869&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Front-20.png?fit=577%2C869&ssl=1\",\"width\":577,\"height\":869,\"caption\":\"Front\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/product\\\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#website\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\",\"name\":\"Finstock Evarsity Resources\",\"description\":\"Your online e-resources portal\",\"publisher\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#organization\",\"name\":\"Finstock Evarsity Resources\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/full-logo-small.png?fit=473%2C403&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/full-logo-small.png?fit=473%2C403&ssl=1\",\"width\":473,\"height\":403,\"caption\":\"Finstock Evarsity Resources\"},\"image\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/finstockevarsity\\\/\",\"https:\\\/\\\/x.com\\\/evarsity\",\"https:\\\/\\\/ke.linkedin.com\\\/in\\\/finstock-evarsity-75b147a0\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC529k6jSRuNDWF6cVmFjqCQ\",\"https:\\\/\\\/www.instagram.com\\\/finstockevarsity\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@finstockevarsitycollege\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources","description":"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/","og_locale":"en_US","og_type":"article","og_title":"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources","og_description":"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).","og_url":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/","og_site_name":"Finstock Evarsity Resources","article_publisher":"https:\/\/www.facebook.com\/finstockevarsity\/","article_modified_time":"2025-09-16T15:07:50+00:00","og_image":[{"width":577,"height":869,"url":"https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2025\/09\/Front-20.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@evarsity","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/","url":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/","name":"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level - Finstock Evarsity Resources","isPartOf":{"@id":"https:\/\/finstockevarsity.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/#primaryimage"},"image":{"@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2025\/09\/Front-20.png?fit=577%2C869&ssl=1","datePublished":"2025-09-16T15:07:49+00:00","dateModified":"2025-09-16T15:07:50+00:00","description":"The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).","breadcrumb":{"@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/#primaryimage","url":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2025\/09\/Front-20.png?fit=577%2C869&ssl=1","contentUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2025\/09\/Front-20.png?fit=577%2C869&ssl=1","width":577,"height":869,"caption":"Front"},{"@type":"BreadcrumbList","@id":"https:\/\/finstockevarsity.com\/resources\/product\/protection-of-information-assets-in-certified-information-systems-auditor-certificate-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/finstockevarsity.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/finstockevarsity.com\/resources\/shop\/"},{"@type":"ListItem","position":3,"name":"PROTECTION OF INFORMATION ASSETS IN CERTIFIED INFORMATION SYSTEMS AUDITOR Certificate Level"}]},{"@type":"WebSite","@id":"https:\/\/finstockevarsity.com\/resources\/#website","url":"https:\/\/finstockevarsity.com\/resources\/","name":"Finstock Evarsity Resources","description":"Your online e-resources portal","publisher":{"@id":"https:\/\/finstockevarsity.com\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/finstockevarsity.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/finstockevarsity.com\/resources\/#organization","name":"Finstock Evarsity Resources","url":"https:\/\/finstockevarsity.com\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2018\/08\/full-logo-small.png?fit=473%2C403&ssl=1","contentUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2018\/08\/full-logo-small.png?fit=473%2C403&ssl=1","width":473,"height":403,"caption":"Finstock Evarsity Resources"},"image":{"@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/finstockevarsity\/","https:\/\/x.com\/evarsity","https:\/\/ke.linkedin.com\/in\/finstock-evarsity-75b147a0","https:\/\/www.youtube.com\/channel\/UC529k6jSRuNDWF6cVmFjqCQ","https:\/\/www.instagram.com\/finstockevarsity\/","https:\/\/www.tiktok.com\/@finstockevarsitycollege"]}]}},"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/product\/35594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/comments?post=35594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/media\/35598"}],"wp:attachment":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/media?parent=35594"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/product_brand?post=35594"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/product_cat?post=35594"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/product_tag?post=35594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}