Site MapHelpFeedbackInformation Security
Information Security


Premium content available for purchase is identified in the left-hand Navigation Menu by the asterisk (*) which precedes the content name. Premium Content on this OLC includes:
    1. Tech Plug-Ins and Data Files (Course-wide Content)
    2. Practice Test (Chapter Content)

LO1

Describe the relationship between information security policies and an in formation security plan.

LO2

Summarize the five steps to creating an information security plan.

LO3

Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

LO4

Describe the relationships and differences between hackers and viruses.











BDT 4e OLC Online Learning Center

Home > Business Plug-Ins > Business Plug-In B6