SlideShare a Scribd company logo
1 of 68
CPP Review - 2006 John Hewitt, CPP, CIPM Senior Security Manager Trammell Crow Company 214-438-8861 Information Security
Information Security – Part V Proprietary Information Information over which the possessor asserts ownership and which is related to the activities or status of the possessor in some special way  All Proprietary Information is confidential, but not all confidential information is proprietary.
Information Security Proprietary Information ,[object Object],[object Object],[object Object],[object Object]
Information Security Proprietary Information It can be lost through  inadvertent disclosure It can be  deliberately   stolen by an outsider It can be  deliberately   stolen by an insider There are 3 broad threats to proprietary information:
Information Security Trade Secret A trade Secret is a process or device for continuous use in the operation of the business ,[object Object],[object Object],[object Object],[object Object]
Information Security Trade Secret ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security Trade Secret Trade Secret   information  is entitled by law to  more protection  than other kinds of proprietary information
Information Security Trade Secret/Patent A  trade secret   remains  secret as long as it continues to meet trade secret tests but the  exclusive right  to  patent protection   expires  after  17  years
Information Security ,[object Object],Competitive Intelligence Gathering
Information Security Competitive Intelligence Gathering A  rich source  of  information  is in the information provided to  government regulators Never reveal information to anyone that you would not reveal to a competitor
Information Security Industrial Espionage Industrial espionage  is the theft of information by  legal   or  illegal  means.  It is  more dangerous  than  inadvertent disclosure  by employees in that highly valuable information is stolen for release to others who plan to exploit it.
Information Security Industrial Espionage The  vulnerability assessment  is  conducted  from the  perspective  of the  competitor  and considers: What critical information exists The period of time when the information is critical.  This may be a short period or may be for the life of a product The identity of employees and indirect associates who have access to the information
Information Security “ Wiretapping ” - is the interception of communication  over a wire   w/o participants consent  and  requires physical entry  into the communication circuit “ Bugging ” - interception of communication  w/o participants consent  by means of electronic devices and  w/o penetration  of a wire. Eavesdropping Tactics / Equipment
Information Security Eavesdropping Tactics / Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security Eavesdropping Tactics / Equipment ,[object Object],[object Object],[object Object],[object Object]
Information Security Eavesdropping Tactics / Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security Eavesdropping Tactics / Equipment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information Security
[object Object],[object Object],[object Object],Information Security Telephone Eavesdropping
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information Security Eavesdropping Threat
[object Object],[object Object],Information Security Miscellaneous
Information Security Information Technology Security ** New** Virus – Any hidden computer code that copies itself onto other programs.  Trojan Horse – Code that has been downloaded attached to unsuspecting programs, that later damage or affect data. Bomb –  Code inserted by programmers into legitimate software. (1) sensitive to a time schedule, triggered by date/time. (2) Triggerd by an event, copying a file or opening a program, etc. Trapdoors / Back doors – Intentionally created and inserted when developing software, IE : Microsoft’s XP, etc.
Information Security Cookie Monster / Cookies – Data maintained form your PC for resource sharing, by use of text files sent to the machine via each website.  Allows data such as credit card information to be collected, by unauthorized parties. Information Technology Security Theft of Hardware – The unlawful taking of PC or laptop with the intent of gaining access to a company network or other vital information, or sensitive data.
Information Security Fax Security Security Products Tamperproof security enclosures for fax machines Automated fax distribution systems, stores documents  in employee mail boxes, employees can access with a PIN. Encryption – Transmitting and receiving to prevent reading an intercepted fax.
Information Security Cellular Phones Cellular and cordless telephones, digital and anolog, transmit RF signals which can be intercepted. Digital signals, thought to be sure can be taped and converted back to analog signals for use by an interloper. When a cellular phone is turned on, it transmits a mobile Identification number (MIN) and an electronic serial number which identify cellular set. These signals can be cloned for illicit use.
Information Security Test
1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: ,[object Object],[object Object],[object Object],[object Object]
1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: ,[object Object],[object Object],[object Object],[object Object]
2. Probably the main reason for loss of sensitive information is: ,[object Object],[object Object],[object Object],[object Object]
2. Probably the main reason for loss of sensitive information is: ,[object Object],[object Object],[object Object],[object Object]
3. The primary tool of pre-employment screening is the: ,[object Object],[object Object],[object Object],[object Object]
3. The primary tool of pre-employment screening is the: ,[object Object],[object Object],[object Object],[object Object]
4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: ,[object Object],[object Object],[object Object],[object Object]
4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: ,[object Object],[object Object],[object Object],[object Object]
5. The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called: ,[object Object],[object Object],[object Object],[object Object]
5. The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called: ,[object Object],[object Object],[object Object],[object Object]
6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : ,[object Object],[object Object],[object Object],[object Object]
6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : ,[object Object],[object Object],[object Object],[object Object]
7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: ,[object Object],[object Object],[object Object],[object Object]
7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: ,[object Object],[object Object],[object Object],[object Object]
8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: ,[object Object],[object Object],[object Object],[object Object]
8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: ,[object Object],[object Object],[object Object],[object Object]
9. Two methods of protection against telephone line eavesdropping are apparently reliable.  The first method is “don’t discuss sensitive information” and the other is: ,[object Object],[object Object],[object Object],[object Object]
9. Two methods of protection against telephone line eavesdropping are apparently reliable.  The first method is “don’t discuss sensitive information” and the other is: ,[object Object],[object Object],[object Object],[object Object]
10. The unauthorized acquisition of sensitive information is known as: ,[object Object],[object Object],[object Object],[object Object]
10. The unauthorized acquisition of sensitive information is known as: ,[object Object],[object Object],[object Object],[object Object]
11. Proprietary information is: ,[object Object],[object Object],[object Object],[object Object]
11. Proprietary information is: ,[object Object],[object Object],[object Object],[object Object]
12. A trade secret is: ,[object Object],[object Object],[object Object],[object Object]
12. A trade secret is: ,[object Object],[object Object],[object Object],[object Object]
13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: ,[object Object],[object Object],[object Object],[object Object]
13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: ,[object Object],[object Object],[object Object],[object Object]
14. Which of the following is generally  not true  in regard to proprietary information? ,[object Object],[object Object],[object Object],[object Object]
14. Which of the following is generally  not true  in regard to proprietary information? ,[object Object],[object Object],[object Object],[object Object]
15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent.  This situation may occur when: ,[object Object],[object Object],[object Object],[object Object]
15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent.  This situation may occur when: ,[object Object],[object Object],[object Object],[object Object]
16. The class of person under a  duty to safeguard  a proprietary secret is known as: ,[object Object],[object Object],[object Object],[object Object]
16. The class of person under a  duty to safeguard  a proprietary secret is known as: ,[object Object],[object Object],[object Object],[object Object]
17. Which of the following is  not a  correct statement, or a general rule, involving the protection of proprietary information? ,[object Object],[object Object],[object Object],[object Object]
17. Which of the following is  not a  correct statement, or a general rule, involving the protection of proprietary information? ,[object Object],[object Object],[object Object],[object Object]
18. Probably the chief reason for the loss of information about sensitive operations is: ,[object Object],[object Object],[object Object],[object Object]
18. Probably the chief reason for the loss of information about sensitive operations is: ,[object Object],[object Object],[object Object],[object Object]
19. The term “eavesdropping” refers to: ,[object Object],[object Object],[object Object],[object Object]
19. The term “eavesdropping” refers to: ,[object Object],[object Object],[object Object],[object Object]
20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:  ,[object Object],[object Object],[object Object],[object Object]
20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:  ,[object Object],[object Object],[object Object],[object Object]
[object Object]
Recommended for study: CPP Study Guide – 12 th  Edition Information Security Good Luck ! John Hewitt, CPP, CIPM

More Related Content

What's hot

Intrusion Systems
Intrusion SystemsIntrusion Systems
Intrusion Systemstamilarasan
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threatspattcom
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Surveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowSurveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowRay Welling
 
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...SyedImranAliKazmi1
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 

What's hot (20)

Intrusion Systems
Intrusion SystemsIntrusion Systems
Intrusion Systems
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Vega Econd En 1
Vega Econd En 1Vega Econd En 1
Vega Econd En 1
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
Tab Smarti Presentation General
Tab Smarti Presentation GeneralTab Smarti Presentation General
Tab Smarti Presentation General
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
File000151
File000151File000151
File000151
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
File000152
File000152File000152
File000152
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
B010331019
B010331019B010331019
B010331019
 
Surveillance in the workplace - what you should know
Surveillance in the workplace - what you should knowSurveillance in the workplace - what you should know
Surveillance in the workplace - what you should know
 
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
 
551 2006 3
551 2006 3551 2006 3
551 2006 3
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Test
TestTest
Test
 

Similar to CPP Review - Proprietary Info

Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015eFax Corporate®
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Ruth Thomson
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 

Similar to CPP Review - Proprietary Info (20)

File000154
File000154File000154
File000154
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Information Security
Information SecurityInformation Security
Information Security
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 

CPP Review - Proprietary Info

  • 1. CPP Review - 2006 John Hewitt, CPP, CIPM Senior Security Manager Trammell Crow Company 214-438-8861 Information Security
  • 2. Information Security – Part V Proprietary Information Information over which the possessor asserts ownership and which is related to the activities or status of the possessor in some special way All Proprietary Information is confidential, but not all confidential information is proprietary.
  • 3.
  • 4. Information Security Proprietary Information It can be lost through inadvertent disclosure It can be deliberately stolen by an outsider It can be deliberately stolen by an insider There are 3 broad threats to proprietary information:
  • 5.
  • 6.
  • 7. Information Security Trade Secret Trade Secret information is entitled by law to more protection than other kinds of proprietary information
  • 8. Information Security Trade Secret/Patent A trade secret remains secret as long as it continues to meet trade secret tests but the exclusive right to patent protection expires after 17 years
  • 9.
  • 10. Information Security Competitive Intelligence Gathering A rich source of information is in the information provided to government regulators Never reveal information to anyone that you would not reveal to a competitor
  • 11. Information Security Industrial Espionage Industrial espionage is the theft of information by legal or illegal means. It is more dangerous than inadvertent disclosure by employees in that highly valuable information is stolen for release to others who plan to exploit it.
  • 12. Information Security Industrial Espionage The vulnerability assessment is conducted from the perspective of the competitor and considers: What critical information exists The period of time when the information is critical. This may be a short period or may be for the life of a product The identity of employees and indirect associates who have access to the information
  • 13. Information Security “ Wiretapping ” - is the interception of communication over a wire w/o participants consent and requires physical entry into the communication circuit “ Bugging ” - interception of communication w/o participants consent by means of electronic devices and w/o penetration of a wire. Eavesdropping Tactics / Equipment
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Information Security Information Technology Security ** New** Virus – Any hidden computer code that copies itself onto other programs. Trojan Horse – Code that has been downloaded attached to unsuspecting programs, that later damage or affect data. Bomb – Code inserted by programmers into legitimate software. (1) sensitive to a time schedule, triggered by date/time. (2) Triggerd by an event, copying a file or opening a program, etc. Trapdoors / Back doors – Intentionally created and inserted when developing software, IE : Microsoft’s XP, etc.
  • 23. Information Security Cookie Monster / Cookies – Data maintained form your PC for resource sharing, by use of text files sent to the machine via each website. Allows data such as credit card information to be collected, by unauthorized parties. Information Technology Security Theft of Hardware – The unlawful taking of PC or laptop with the intent of gaining access to a company network or other vital information, or sensitive data.
  • 24. Information Security Fax Security Security Products Tamperproof security enclosures for fax machines Automated fax distribution systems, stores documents in employee mail boxes, employees can access with a PIN. Encryption – Transmitting and receiving to prevent reading an intercepted fax.
  • 25. Information Security Cellular Phones Cellular and cordless telephones, digital and anolog, transmit RF signals which can be intercepted. Digital signals, thought to be sure can be taped and converted back to analog signals for use by an interloper. When a cellular phone is turned on, it transmits a mobile Identification number (MIN) and an electronic serial number which identify cellular set. These signals can be cloned for illicit use.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68. Recommended for study: CPP Study Guide – 12 th Edition Information Security Good Luck ! John Hewitt, CPP, CIPM