Page 9 - CITP Review
P. 9

Chapter 1





            Information Security and Cyber Risk






            Learning objectives

              Identify the key areas of information security, including strategy, policies and procedures, control
               environments, and business continuity and disaster recovery.

              Differentiate fundamental knowledge of various IT governance frameworks.

              Recognize logical access at the various levels of the “stack.”


              Identify the internal control structure of design, implementation, monitoring, detection, and reporting.

              Determine the major threat vectors for systems, including cyber adversaries, the cybercrime
               economy, and various types of attacks

              Identify data breaches and their impact on information privacy.

              Determine how to manage system vulnerabilities.


              Apply the SOC for Cybersecurity report, including report content, target users, and use of the report in
               conjunction with an entity’s overall cybersecurity risk mitigation strategy












            © 2019 Association of International Certified Professional Accountants. All rights reserved.    1-1
   4   5   6   7   8   9   10   11   12   13   14