Week 1 Unit 1 Legal Issues in Information Security- Information Systems Security Overview Flashcards
What is the “information security triad”?
Availability
Integrity
Confidentiality (AIC)
Common information security concerns?
Shoulder surfing Social Engineering Spear phishing Malware Spyware Logic bomb Back door denial of service
Data Classification: Military and Corporate
See Table 1
Legal mechanisms to ensure information security
Laws
Information Regulations
Agencies
Laws to ensure Information Security
Gramm-Leach-Bliley Act
HIPAA
Sarbanes-Oxley (SOX)
and others
Information Regulations to ensure Information Security
Financial
Credit Card
Health
etc
Agencies to ensure information security
FTC Banks DHHS SEC DOE etc
Risk Management Concepts
Vulnerability Mitigation Threat Agent Exploits Risks
Vulnerability
Asset weaknesses
Mitigation
Safeguard assets
Threat Agent
Hacker or malware
Exploits
Threats carried out
Risks
minimized by asset owner
Risk Management Process
See Chart 1
Roles in Risk Management
See Chart 2