The need for effective information security awareness practices.
IT Security management and risk assessment
Legal and ethical aspects
Can you solve this
It security controls, plans, and procedures
Symmetric encryption and message confidentiality