1.
|
Define information security. (I)
|
2.
|
Describe the different types of information security attackers and
attacks that can occur. (I)
|
3.
|
Identify different security techniques available (II)
|
4.
|
Describe various methods of implementing security on computers. (II)
|
5.
|
List the criteria used to develop and implement a security policy in a
personal or business setting. (III)
|
6.
|
Identify the components of a business continuity plan. (III)
|
7.
|
Describe risks associated with accessing the internet and using e-mail
programs. (IV)
|
8.
|
List preventive measures used to minimize attacks with internet and
e-mail programs. (IV)
|
9.
|
Discuss types of network attacks and appropriate techniques used to
enhance network security perimeters. (V)
|
10.
|
Describe the challenges to make a computer secure including the
methods available to help reduce the risks of an attack. (VI)
|
|