This document provides information on IT security management, including the importance of IT policies, ways computer programmers can be involved in fraud, control mechanisms to monitor and control fraud, roles and responsibilities of a security administrator, steps of security risk assessment, ways to identify fraud scams, and approaches to promote information security in an IT department.