Premium content available for purchase is identified in the left-hand Navigation Menu by the asterisk (*) which precedes the content name. Premium Content on this OLC includes:
1. Tech Plug-Ins and Data Files (Course-wide Content)
2. Practice Test (Chapter Content)
LO1
Describe the relationship between information security policies and an in formation security plan.
LO2
Summarize the five steps to creating an information security plan.
LO3
Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
LO4
Describe the relationships and differences between hackers and viruses.
To learn more about the book this website supports, please visit its Information Center.