13-2 Flashcards
a framework that can be effective in providing a structured applicable to a diverse set of cyber security environments
Control Objects for information and related technologies.
first released in 1996. published as an ISO standard 17799:2005 in 2005.version 5 released in April 2012
Cobit
the current version of COBIT has 5 components
framework process descriptions control objectives management guidelines maturity models
the component of cobit is one of the aspects of the standard that makes is relatively easy to integrate other standards. its rather general. and requires organizations develop good practices related to the buisness.
framework
this component requires the organization to clearly describe all business processes
process descriptions
this component requires the organization to establish clear objectives for each security control
control objectives
this component requires management to establish responsibility for achieving security goals and implement methods to measure the performance of security controls
managlement guidelines
this component examines any prpocess from the point of view of how developed that process is.
maturity models
the common criteria foir information security evaluation
ISO/IEC 15408
systems and software engineering
ISO/IEC 25000
information technology - security technoology
ISO/IEC 27000
risk managment
ISO/IEC 27001
accredited certification standard
ISO/IEC 27006
this special publication describes common security principles that should be addressed within security policies
NIST SP 800-14
the purpose of rthe NIST SP 800-14 is to describe 8 principles and 14 practices that can be used to develop security policies. the standard is based on 8 principles which are
“compute” security supports the mission
“” is an integral element of sound management
“” should be cost-effective
““responsibilities and accountability should be made explicit
““requires a comprehensive and integrated approach
“” should be periodically reassessed
“” is security contained by societal factors
system owners have security responsibilities outside their own organization