Part I: INTRODUCTION and OVERVIEW Chapter 1 - Introduction Chapter 2 - Elements of Computer Security Chapter 3 - Roles and Responsibilities Chapter 4 - Common Threats: A Brief Overview
Part II: MANAGEMENT CONTROLS Chapter 5 - Computer Security Policy Chapter 6 - Computer Security Program Management Chapter 7 - Computer Security Risk Management Chapter 8 - Security and Planning in the Computer Security Life Cycle Chapter 9 - Assurance
Part III: OPERATIONAL CONTROLS Chapter 10 - Personnel / User Issues Chapter 11 - Preparing for Contingencies and Disasters Chapter 12 - Computer Security Incident Handling Chapter 13 - Awareness, Training and Education Chapter 14 - Security Considerations in Computer Support and Operations Chapter 15 - Physical and Environmental Security
Part IV: TECHNICAL CONTROLS Chapter 16 - Identification and Authentication Chapter 17 - Logical Access Control Chapter 18 - Audit Trails Chapter 19 - Cryptography
Part V: EXAMPLE Chapter 20 - Assessing and Mitigating the Risks to a Hypothetical Computer System