This domain examines computer crimes, laws, and regulations. This includes techniques in investigating a crime, gathering evidence, and handling procedures. It also covers how to develop and implement an incident-handling program.
This domain examines the preservation of business activities when faced with disruptions or disasters. This involves the identification of real risks, proper risk assessment, and countermeasure implementation.
This domain examines the security components within operating systems and applications and how to best develop and measure their effectiveness. This domain looks at software life cycles, change control, and application security.