IA 2 - UNIT 3 Flashcards
Benefits of Incorporating Security Considerations
- Early integration reduces disruptions and costs.
- Ongoing security adaptation to evolving threats.
- Retrofitting post-incident is costly and less effective.
- Regular updates to the security plan are vital.
- Documenting decisions aids comprehensive coverage and audits.
is the overall process of creating, implementing, and decommissioning information systems through a multistep process from initiation, analysis, design, implementation, and maintenance to disposal.
system development life cycle
SDLC Phases
- Initiation
- Development
- Implementation
- Maintenance
- Disposal
INITIATION PHASE
- Need establishment
- Security categorization
- Initial Risk Assessment
DEVELOPMENT/ACQUISITION PHASE
- Requirement analysis/ development
- Risk assessment
- Budgeting
- Security planning
- Security control development
- Security test and evaluation
IMPLEMENTATION PHASE
- Security test and evaluation
- Inspection and acceptance
- System integration/installation
- Security accreditation
OPERATION/MAINTENANCE PHASE
- Configuration management and control
- Continuous monitoring and continuous accreditation (authorization)\
2 Layer of Defense
- Physical security of premises and offices
- Physical security of equipment
Main Threats For Physical and Environmental Security
- Energy (Electricity)
- Equipment (Mechanical or electronic components) Fire and Chemical Hazard (smoke, industrial pollution)
- Manmade Disasters (war, terrorist attack, bombing) Natural Disaster (earthquake, volcano, landslide, storms)
- Pandemic Disease (bacteria, virus) Radiation (electromagnetic pulse)
- Weather (Sandstorm, humidity, flood, lightning)
DISPOSAL PHASE
Information preservation Media sanitization
Hardware and software disposal
- Premises that contain critical information or systems require special protection.
The following controls are related to the physical security of premises.
* One of the controls is to establish the security perimeter as the outer boundary.
* This perimeter should contain all critical assets. Within this perimeter, there may be more secure areas or enclaves.
Physical security of premises and offices
- Protect information-processing equipment physically to minimize the risk of unauthorized access to information and to safeguard against loss or damage.
- Offsite computing systems for reconstitution or contingency operations should also be addressed in a physical security plan.
Physical security of equipment
Physical Entry Controls
- Employee Access
- Visitor Access
Positive identification and access control are mandatory; therefore, all employees should be required to always wear some form of visible identification (ID badge) whenever they are on the premises.
Employee Access
require redundancy in electric power system availability. (UPS or Backup Generators)
Electrical Power
- Maintenance of information processing equipment based on the manufacturer’s recommended service intervals and specifications.
- All maintenance services to the equipment either onsite or sent off from the premises also need to be recorded and tracked.
Equipment Maintenance
Use of any equipment outside an organization’s premises should be authorized by management.
PHYSICAL SECURITY OF EQUIPMENT OFF-PREMISES
Careless disposal, disposition, or recycling of equipment can put information at risk.
SECURE DISPOSAL AND REUSE OF EQUIPMENT
These devices can help mitigate the risks associated with malicious code and the loss of proprietary information by raising employee awareness about removable media usage policies and minimizing potential damage.
MANAGEMENT OF REMOVABLE MEDIA
Disposal of Media
The following are some guidelines of proper media disposal:
- Electronic media
- Printed materials
- containing sensitive customer information should be degaussed prior to disposal.
- Degaussing completely erases the information stored on the magnetic surface.
Electronic media
which hold confidential and restricted data, should be
destroyed in a secure way, such as by shredding
Printed materials
An effective AT&E program has four stages:
literacy, awareness, training, and education (LATE).
- To cultivate a strong information assurance culture among employees, emphasize the organization’s commitment to safeguarding information assets through training
Purpose of the AT&E Program
Types of Learning Programs
- IA AWARENESS
- IA TRAINING
- IA EDUCATION
serve to motivate a sense of responsibility and encourage employees to be more cautious about their work environment.
IA AWARENESS
Training aims to teach or improve an individual’s skill, knowledge, or attitude, which allows a person to carry out a specific function.
IA TRAINING