Lesson 4 Flashcards
The process of identifying and controlling threats.
Risk Management
Risks can stem from: (5)
Financial Uncertainties
Legal Liabilities
Technology Issues
Strategic Management Errors
Accidents and Natural Disasters
The process to achieve and maintain appropriate levels of key security services. (integrity, confidentiality, availability, reliability, accountability, authenticity)
Security Management
The IT Security Management Functions include: (8)
⚬ organizational IT security objectives, strategies and policies
⚬ determining organizational IT security requirements
⚬ identifying and analyzing security threats to IT assets
⚬ identifying and analyzing risks
⚬ specifying appropriate safeguards
⚬ monitoring the implementation and operation of safeguards
⚬ developing and implement a security awareness program
⚬ detecting and reacting to incidents
An ISO 27000 security standard for vocabulary and standard definition.
ISO 27000
An ISO 27000 standard for information security specifications.
ISO 27001
An ISO 27000 standard for code of practice and a comprehensive set of security controls.
ISO 27002 (ISO 17799)
An ISO 27000 standard for implementation guidance.
ISO 27003
An ISO 27000 standard for management measurement.
ISO 27004
An ISO 27000 standard for information security risk management.
ISO 27005
An ISO 27000 standard for the management of IT security.
ISO 13335
Which phase of the Deming Cycle establishes policy and defines objectives?
Plan
Which phase of the Deming Cycle deals with mplementation and operation?
Do
Which phase of the Deming Cycle assesses, measures, and reports results?
Check
Which phase of the Deming Cycle deals with taking action based on audit reports?
Act