- Information system security.
- Information security laws.
- Network security services (NSS).
- Information system physical security.
- Web servers and Web application security.
- Authentication, cryptography, digital signatures and privacy.
- Incident response and handling. Intrusion detection systems.
- Disaster recovery and business continuity.
- Risk analysis and risk management.
- E-business security issues.
- E-business security policies.
Literature
1. Aceituno, V.: On Information Security Paradigms,ISSA Journal, September, 2005.
Advised literature
Pipkin, D.: Information security: Protecting the global enterprise. New York, 2000, Hewlett- Packard Company.