The importance of maintaining privacy and confidentiality of company information, as well as that of customers and colleagues, such as not sharing information about salaries, employee perks, client lists, trade secrets, sales numbers, customer information, news about pending terminations, reasons for a firing, phone codes or computer passwords
An understanding of processes and protocols used to ensure internet security, including concepts of security assurance
An understanding of threats and vulnerabilities including the following areas:
Technical, such as Botnets, Distributed denial-of-service (DDoS), Hacking, Malware, Pharming, Phishing, Ransomware, Spam
Physical, including vulnerabilities such as the characteristics and circumstances of a community, system or asset that make it susceptible to damaging effects
Human such as human error, malicious employees and disguised criminals
The interrelationship between security, identity, confidentiality, integrity, availability, threat, vulnerability and risk management