The three primary goals of an information security program are to prevent the loss of confidentiality, the loss of integrity, and the loss of availability for any IT systems and data.
“An audit generally requires the presentation of evidence of control design and effectiveness, where a review often does not.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“The Cable of Fear”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Netflow This is a network anomaly detection protocol developed by Cisco Systems and is available on Cisco Systems routers.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“Access recertification is a corrective control that helps reduce accumulation of privileges.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
“A digital signature is a cryptographic operation where a sender “seals” a message or file using her identity.”
― CISM Certified Information Security Manager All-in-One Exam Guide
― CISM Certified Information Security Manager All-in-One Exam Guide
Johnson’s 2024 Year in Books
Take a look at Johnson’s Year in Books, including some fun facts about their reading.
More friends…
Favorite Genres
Polls voted on by Johnson
Lists liked by Johnson






























