3units Key issues associated with protecting information assets. Levels of protection and respons to security incidents. Planning for security and management of the system. Application of software, cryptography, encryption methods. Mobile and cloud systems security.