8.1.1
Types of confidential information
8.1.2
Why information is kept confidential
8.1.3
Impact of failing to maintain confidentiality
8.2.1
Potential technical threats
8.2.2
Potential technical vulnerabilities
8.2.3
Potential human threats
8.2.4
Potential physical vulnerabilities
8.2.5
Potential impact of threats and vulnerabilities
8.3.1
Threat mitigation techniques
8.3.2
Internet security
8.4.1
The CIA triad
8.4.2
The IAAA model