Examine information systems’ vulnerability and the possible damage from malfunctions. Describe the major methods of defending information systems. Describe the security issues of the Web and electronic commerce. Describe security auditingRead less