7. Information Security and IS Risk Management


7. Information Security and IS Risk Management

7.1 Access Control and Security Threats

  • Access Control Mechanisms and Their Types

  • Security Threats and Vulnerabilities

  • Security Attacks Overview

  • Authentication and Authorization Mechanisms

  • Password Management and Policies


7.2 System Hardening and Threat Prevention

  • System Hardening Techniques

  • Preventing Cyber-Attacks and Threats

  • Patch Management and Configuration Management


7.3 Security Auditing and Assessment

  • Information Systems (IS) Audit Principles

  • Vulnerability Assessment

  • Penetration Testing

  • Change Management in Security


7.4 Disaster Recovery and Incident Handling

  • Fundamentals of Disaster Recovery

  • Incident Handling and Response Procedures


7.5 Information Systems Risk Management

  • IS Risk Concepts and Types

  • Risk Identification

  • Risk Assessment

  • Risk Response and Mitigation

  • Risk and Control Monitoring and Reporting