ABSTRACT

After reading this chapter and completing the case project, you will • Understand the steps organizations take in controlling access

to ICT assets; • Understand the steps necessary to ensure that personnel

are provided appropriate professional development to foster awareness of cybersecurity;

• Understand the importance of security policy within a cybersecurity program;

• Understand the importance of implementing security controls associated with maintaining ICT systems; and

• Understand the steps necessary to protect communication systems and removable media.