ABSTRACT
After reading this chapter and completing the case project, you will • Understand the steps organizations take in controlling access
to ICT assets; • Understand the steps necessary to ensure that personnel
are provided appropriate professional development to foster awareness of cybersecurity;
• Understand the importance of security policy within a cybersecurity program;
• Understand the importance of implementing security controls associated with maintaining ICT systems; and
• Understand the steps necessary to protect communication systems and removable media.