This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Operational controls Penetration testing Physical design phase Physical security Plan-driven Red teams Risk analysis Risk assessment Risk management Safeguard Security education, training, and awareness (SETA) Security Managers Security systems development life cycle (SecSDLC) Security technicians Strategy Structured review Systems development life cycle (SDLC) Technical controls Threat Threat agent Tiger teams Top-down approach Values statement Vision statement Vulnerability White-hat hackers Principles of Information Security 1-2...
View Full Document
This note was uploaded on 08/27/2010 for the course IS 2820 taught by Professor Jameskoshi during the Spring '10 term at Webber.
- Spring '10
- Information Security