The following exam domain is partially covered in this chapter:
Domain 5—Protection of Information Assets
This chapter covers the following topics:
Access Control: Controlling who has access and how that access occurs is one of the first lines of defense in protecting an organization’s assets.
Security Controls for Hardware and Software: Security controls are used to protect critical asserts and can deter, delay, prevent, and detect unauthorized access attempts.
Protection of Information Assets: One of the keys ...