Unformatted text preview: 800-14. 4. List and describe four elements that should be present in the Enterprise Information Security Policy. Exercise 1. Using the Internet and a browser, go to the International Information Systems Security Certifications Consortium Web site (www.isc2.org) and look for the information security common body of knowledge (CBK). What are the areas addressed in the CBK? Was policy listed?...
View Full Document
- Spring '10
- Information Security, security policy, information security policy