This document provides an overview of chapter 5 from the CISA review course, which focuses on protecting information assets. It discusses the importance of information security management and outlines key elements like policies, procedures, monitoring and compliance. It also covers logical access exposures and controls, including identification and authentication, authorization issues, and audit logging. The chapter examines network infrastructure security risks for LANs, client-server environments, wireless networks and the internet.