IAS - APPROACHES TO INFORMATION . . Flashcards
Lesson 2
A method of establishing security policies and/or practices that begins as a grassroots in system administrator attempt to improve the security of their systems.
Employee Input
Company Wide Collaboration
Tasks Completed and Sent to higher ups
BOTTOM-UP APPROACH
A methodology of establishing security policies and/or practices that is initiated by upper management.
Jobs are Altered and Completed Based on Higher Authority
Employees receive specific tasks
Tasks Delegated by Upper management
TOP-DOWN APPROACH
SECURITY IN THE SYSTEMS DEVELOPMENT LIFE CYCLE
an SDLC is a methodology for the design and implementation of an information system.
Using a methodology ensures a rigorous process with clearly defined goal and increases the probability of success.
SYSTEM DEVELOPMENT LIFE CYCLE
A type of SDLC in which each phrase of the process “flows from” the information gained in the previous phase, with multiple opportunities to return to previous phase, . .
Waterfall Model
Waterfall Methodology Phases
(I, A, L , P , I ,M)
- Investigation
- Analysis
- Logical Design
- Physical Design
- Implementation
- Maintenance and Change
Begins by examining the event or plan that initiates the process
During this phase, the objectives constraints, . . .
INVESTIGATION
This phase consists primarily of assessment of the organization, its current systems, and its capability to support the proposed systems
ANALYSIS
Begin in creating a streams solution for a business problem. In any system solution, the driving factor must be the business need.
LOGICAL DESIGN
Specific technologies are selected to support the alternatives identified and evaluated in the logical design.
PHYSICAL DESIGN
**Any needed software is created.
**
Components are ordered, received and tested/ afterwards.
IMPLEMENTATION
Longest and most expensive of the process.
This phase consists of the task necessary to support and modify the system for the remainder of its useful life cycle.
MAINTENANCE AND CHANGE
SECURITY PROFESSIONALS AND THE ORGANIZATION
An executive-level position that oversees the organizations computing technology and strives to create efficiency in the processing
SENIOR MANAGEMENT
Chief Information Officer (CIO)
Top information security officer in an organization.
SENIOR MANAGEMENT
Chief Information Security Officer (CISO)
INFORMATION SECURITY PROJECT TEAM
Promotes the project and ensure its support.
Champion
Understand project management, personnel management, and information security technical requirements.
Team Leader