Verified

Identifies, studies, and develops informative materials to improve the body of technologies, processes and practices to protect information technology assets such as networks, computers, programs and data from hostile attacks, damage or unauthorized access.