The model’s tools

        Security professionals need to understand that compliance, along with strong security policies, can make organizational security stronger, but not completely hacker-proof. Explain how compliance with governing standards can fail to provide...

Viruses and other malware

      Viruses and other malware often exploit bugs known as buffer overflows in widely used software. One method of preventing these exploits in software running on current Windows versions is Data Execution Prevention (DEP). In a 3-4-page,...

Security program training.

    Examine how your organization or an organization you are familiar with, implemented its security program training. Compare and contrast that approach with the seven-step methodology for implementing training. Discuss any gaps between the approach used by...