1.What are the components of PKI?
2.What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization?
3.What are certification and accreditation when applied to information systems security management? List and describe at least two certification or accreditation processes.
4.What are the critical considerations when dismissing an employee? Do these change based on whether the departure is friendly or hostile or according to which position the employee is departing from?
5.What are the three primary aspects of information security risk management? Why is each important?
6.If the C.I.A. triangle is incomplete, why is it so commonly used in security?
7.What value does an automated asset inventory system have for the risk identification process?
All References Cited in APA. NO Plagiarism