This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 800-14. 4. List and describe four elements that should be present in the Enterprise Information Security Policy. Exercise 1. Using the Internet and a browser, go to the International Information Systems Security Certifications Consortium Web site (www.isc2.org) and look for the information security common body of knowledge (CBK). What are the areas addressed in the CBK? Was policy listed?...
View Full Document
- Spring '10