4.1 The processes of design, implementation, and monitoring of security (gap analysis baseline, tool selection)
4.2 Encryption techniques (DES, RSA)
4.3 Public key infrastructure (PKI) components (certification authorities, registration authorities)
4.4 Digital signature techniques
4.5 Physical security practices
4.6 Techniques to identify, authenticate, and restrict users to authorized functions and data (dynamic passwords, challenge/response, menus, profiles)
4.7 Security software (single sign-on, intrusion-detection systems [IDS], automated permission, network address translation)
4.8 Security testing and assessment tools (penetration testing, vulnerability scanning)
4.9 Network and Internet security (SSL, SET, VPN, tunneling)
4.10 Voice communications security
4.11 Attack/fraud methods and techniques (hacking, spoofing, Trojan horses, denial of service, spamming)
4.12 Sources of information regarding threats, standards, evaluation criteria, and practices in regard to information security
4.13 Security monitoring, detection, and escalation processes and techniques (audit trails, intrusion detection, computer emergency response team)
4.14 Viruses and detection
4.15 Environmental protection practices and devices (fire suppression, cooling systems)