3units Key issue associated with protecting information assets. Levels of protection and response to security incidents. Planning for security and management of the system. Application of software, cryptography, encryption methods. Mobile and cloud systems security.