This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Operational controls Penetration testing Physical design phase Physical security Plan-driven Red teams Risk analysis Risk assessment Risk management Safeguard Security education, training, and awareness (SETA) Security Managers Security systems development life cycle (SecSDLC) Security technicians Strategy Structured review Systems development life cycle (SDLC) Technical controls Threat Threat agent Tiger teams Top-down approach Values statement Vision statement Vulnerability White-hat hackers Principles of Information Security 1-2...
View Full Document
- Spring '10
- Information Security