After completing the course, the student is able to:
-list the phases of information security risk management process
-give examples of different information security risk assessment methods
-analyze the results of information security risk assessment
-construct a privacy policy
-protect his/her privacy in electronic data communication