LO4.1 | Explain the ethical issues in the use of information technology. |
LO4.2 | Identify the six epolicies organizations should implement to protect themselves. |
LO4.3 | Describe the relationships and differences between hackers and viruses. |
LO4.4 | Describe the relationship between information security policies and an information security plan. |
LO4.5 | Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response. |