Unit 2 - Information security architecture and model
PDF Contain:
2.1. Information security and Risk Management, Security policies, guidelines, standards 2.2. Trusted computing base, Rings of Trust, Protection Mechanisms in a trusted Computing Base 2.3. System security assurance concepts, Trusted computer security Evaluation Criteria 2.4. Information Technology security Evaluation Criteria, Confidentiality and Integrity Models |
This information security note contains the following topics
Unit 1 - Introduction to Information Security
Unit 3 - Cryptography
Unit 4 - Data Recovery
Unit 5 - Cyber Crime & Security
Unit 6 - Acess physical control and compliance standards