Problem
1. What are the planning and control areas when establishing security management?
2. What cyber threats are critical to infrastructure as observed by the FBI?
3. What is the purpose of a security policy?
4. What steps are considered as important to a disaster recovery plan?
5. Why does a disaster recovery plan need to be tested?