Video Content Lesson 1 Flashcards
Security Triad
CIA
Confidentiality
Integrity
Availability
Confidentiality
Protects from
Protects Data from Unauthorized Disclosure
Confidentiality
4 parts
Physical Security
Access Control
Encryption
Perimeter Defense
Integrity
Protects from
Protects Data from Unauthorized Modification
Integrity
3 parts
Physical Security
Access Control
Perimeter Defense
Availability
Ensures the system is available when needed
InfoSec Management Governance
1-Assurance that appropriate security activities are being carried out
2-Security risks are being reduced
3-Security budget is being properly used
Audit Frameworks for Compliance
1-COSO (Committee of Sponsoring Organizations of the Treadway Commission)
2-ITIL (Information Technology Infrastructure Library)
3-COBIT (Control Objectives for Information and related Technology)
4- ISO 17799 / BS 7799
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
1-Defines 5 areas of internal control
2-Useful in meeting Sarbanes-Oxley Section 404 compliance
ITIL (Information Technology Infrastructure Library)
1-British government’s TSO (The Stationary Office)
2-Best practices for IT service management
COBIT (Control Objectives for Information and related Technology)
1-ITGI (IT Governance Institue)
2-Overall structure for Information Technology Control
ISO 17799 / BS 7799
1-Originially, UK Department of Trade and Industry Code of Practices
2-Basis for developing security standards and security management practices
Security Administration
1-Management is responsible to ensure security 2-Look at Security Goals a-Strategic - Long-term b-Tactical - Medium Term c-Operational - day-to-day
Organizational Requirements
1-Government or Commercial
2-Management Style and Organizational Culture
Physical Risks
Handling risks that can cause loss
Physical Damage
Hardware Malfunction
Software Malfunction
Human Risks
Malicious Attack
Espionage and theft
Human Errors
Risk Management
RM involves assessing risks and choosing appropriate responses
Risk Management Terms
Threat
Vulnerability
Probablility Determination
Control
Risk Management Options
Allow risk to exist
Reduce Loss