Peer Review for material titled "Information Security Management Concepts"
eTextbook Reviews for material titled "Information Security Management Concepts"
User Rating for material titled "Information Security Management Concepts"
Member Comments for material titled "Information Security Management Concepts"
Bookmark Collections for material titled "Information Security Management Concepts"
Course ePortfolios for material titled "Information Security Management Concepts"
Learning Exercises for material titled "Information Security Management Concepts"
Accessibility Info for material titled "Information Security Management Concepts"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search



        

Search > Material Results >

Information Security Management Concepts

        

Information Security Management Concepts

Logo for Information Security Management Concepts
This demonstration module provides an overview of the key concepts and goals of information security and how information security relates to an organization's information and technology assets. This interactive, self-paced instruction uses video, audio, text, case studies, practice exercises, and quizzes to promote and guide learning and understanding. This material is appropriate for end users, IT professionals, IT managers, and executives. A full version is available on CD ROM.
Go to material
Material Type: Collection
Technical Format: HTML/Text
Date Added to MERLOT: January 16, 2003
Date Modified in MERLOT: November 06, 2016
Author:
Submitter: Matt Rose

Quality


  • Rate this material
  • Create a learning exercise
  • Add accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
    Edit the information about the material in this {0}
    Submitting Bookmarks...

About

Primary Audience: High School, College General Ed, Professional
Mobile Compatibility: Not specified at this time
Technical Requirements: 5.0 or higher browser
Quicktime or RealMedia Plugin
Macromedia Flash Player Plugin
Audio Capabilities
Language: English
Material Version: 5
Cost Involved: no
Source Code Available: no
Accessibility Information Available: no
Creative Commons: unsure

Connections



QR Code for this Page

Users who viewed this material also viewed...

Discussion

Discussion for Information Security Management Concepts

Log in to participate in the discussions or Sign up if you are not already a MERLOT member.

Return to Top of Page
Avatar for daniel dolan
2 years ago

daniel dolan (Student)

cis 378 is fun
Used in course