Explain why information systems are vulnerable to destruction, error, and abuse.
Assess the business value of security and control.
Identify the components of an organizational framework for security and control.
Evaluate the most important tools and technologies for safeguarding information resources.