Is Unit 2 - Information security architecture and model

 Unit 2 - Information security architecture and model





PDF Contain:

2.1. Information security and Risk
Management, Security policies,
guidelines, standards
2.2. Trusted computing base, Rings of
Trust, Protection Mechanisms in a
trusted Computing Base
2.3. System security assurance concepts,
Trusted computer security Evaluation
Criteria
2.4. Information Technology security
Evaluation Criteria, Confidentiality
and Integrity Models



This information security note contains the following topics 

Unit 1 - Introduction to Information Security

Unit 3 - Cryptography

Unit 4 - Data Recovery

Unit 5 - Cyber Crime & Security

Unit 6 - Acess physical control and compliance standards

Post a Comment (0)
Previous Post Next Post