Module 5: L2 Flashcards
When implementing IS policy, one must address the concerns of top management. What are 3x concerns they may have?
- Value info has for the business
- How IS contributes to business objectives
- How info can be made more secure
When implementing IS, perception and commitment of ______ ________ are critical
top management
IS begins with top management. They need to identify critical business processes and classify them as critical, important, or routine, like:
- Star performers
- Failure in a process severely impacts the organization
- Delays in a process are unacceptable
What are the 3x pillars of security?
Confidentiality
Integrity
Availability
When doing vulnerability assessments, what are some features considered for each one?
- Natural origin
- Human made origin
- Location of action
What are some components affected by vulnerabilities?
- Software
- Hardware
- People
- Services
- Documents
Given organizational structure, one should estimate likelihood of leakage within certain flows:
- Subordination flow
- Info flow
- Human factors
- IT infrastructure
Info leakage rules. Info leakage increases with (3x):
- Number of subjects with access
- Number of transactions
- Ability to modify info does not correspond with increasing level of security
What are 4x forms of human error in IS?
- Secret info leaked unintentionally or on purpose
- Secret info mistakenly forwarded to lower security level
- Info sent to wrong person by mistake
- Unauthorized person sends data