Information security program

Develop an information security program that aligns with organizational strategies by evaluating business requirements, applicable laws, regulations, standards, and best practices, Integrate confidentiality, integrity, and availability (CIA) concepts into the development of an information security program, Evaluates and recommend information and security technologies to support the information security program, Evaluate and discuss the fundamental reasons why information systems security is such a critical element in today’s business, government, education, and home technology-based environments, Review and develop the key elements of an information systems security management program, Perform and document a risk-based analysis of information systems security for an organization, including the identification of threats, vulnerabilities, and countermeasures, Explain the various controls available for protection against internet attacks, including authentication, integrity check, firewalls, and intruder detection systems.