Information Management |
|
The CIA Security Triad |
|
00:04:00 |
|
Classification |
|
00:03:00 |
|
Labeling and Handling |
|
00:01:00 |
Security Governance |
|
Information Security Policies |
|
00:03:00 |
|
Computer and Hardware Policies |
|
00:05:00 |
|
Incident Management |
|
00:03:00 |
|
Disaster Recovery |
|
00:03:00 |
Data Management |
|
Data Retention |
|
00:02:00 |
|
Destruction and Sanitization |
|
00:05:00 |
Security Controls |
|
File encryption and Access Control |
|
00:03:00 |
|
Anti-Virus Software |
|
00:03:00 |
|
Remote Access Operations |
|
00:03:00 |
|
Physical controls |
|
00:04:00 |
|
System Patches |
|
00:03:00 |
Test |
|
Security concepts |
|
00:15:00 |