IT Examiner School, Providence, RI

Information Security Security Monitoring

• Networks • Systems • Applications

Access

• Authorized and Unauthorized

Information Security

Detection/prevention • Removal of data/loss prevention • Unauthorized software/devices

Adequacy/frequency

• Vulnerability assessment • Penetration tests

Made with FlippingBook Annual report