1.What are the components of PKI?
2.What is physical security? What are the primary threats to
physical security? How are they manifested in attacks against the organization?
3.What are certification and accreditation when applied to
information systems security management? List and describe at least two
certification or accreditation processes.
4.What are the critical considerations when dismissing an
employee? Do these change based on whether the departure is friendly or hostile
or according to which position the employee is departing from?
5.What are the three primary aspects of information security
risk management? Why is each important?
6.If the C.I.A. triangle is incomplete, why is it so
commonly used in security?
7.What value does an automated asset inventory system have
for the risk identification process?
All References Cited in APA. NO Plagiarism