INSY4900 Ch01
INSY4900 Ch01
INSY4900 Ch01
Information security: professionals could include the Security Analyst, the Security
Architect, and the CISO.
The rest of the organization: professionals could include non-technical staff, such
as, the Director of Human Resources, the CFO, and the CEO.
10. What are the three types of general planning? Define each.
Tactical Planning: production planning, one to five years, smaller scope then
enterprise planning
11. List and describe the five steps of the general problem-solving process. They are
recognizing and defining the problem, gathering facts and making assumptions,
developing possible solutions, analyzing and comparing possible solutions, and selecting,
implementing, and evaluating a solution.
13. Why are project management skills important to the InfoSec professional?
Information security is a process, not a project. However, each element of an information
security program must be managed as a project, even if the overall program is perpetually
ongoing. It is essential that InfoSec professionals posses project management skill, so
they can identify and control resource applied to a project, as well as messure the
progress and make adjustments to the process (objectives) in order to complete the goal.
18. What is a work breakdown structure (WBS) and why is it important? It is a
planning tool (as simple as a spreadsheet in some cases) which helps break down tasks.
WBS can further divide tasks into action steps.
20. How do PERT/CPM methods help to manage a project? These two diagramming
techniques are designed to identify and manage the sequence of tasks that make up the
shortest time to complete a project.
Exercises
1. Assume that a security model is needed for the protection of information in your class
you are taking--say, the information found in your course's learning management system
(if your class uses one). Use the CNSS model to identifyeach of the 27 cells needed for
complete information protection. Write a brief statement on how you would address the
components represented in the of the 27 cells.
a) Personal Information
1] Confidentiality the public should not have access to this info.
2] Integrity my personal info should be accurate at all times.
3] Availability I am able to access my personal info and change it.
4] Storage my personal info is stored in a secure server storage.
5] Processing if I change my info it would reflect the changes I made.
6] Transmission my personal information should be encrypted.
7] Policy access to my info are only available to me and Admin.
8] Educationtraining staff in the security of personal information.
9] Technology encryption software is used to transmit my info.
b) Exams and Tests
Time Consuming
3. Draft a work breakdown structure for the task of implementing and using a PCbased virus detection program (one that is not centrally managed). Don't forget to
include tasks to remove or quarantine any malware it finds
Task
.25
.
50
.
25
End User
End User
End User
1-3 var
End User
25
End User
Case Exercises
1. Based on your reading of the chapter and what you now know about the issues,
list at least three other things Charley could recommend to Iris.
Try to tackfully overcome resistance from IT and non-technical managers. This may
be accomplish by initiating education, training, and awareness programs. It this fails,
she may need to get upper management inevoled in the process (group meetings).
2. What do you think is the most important piece of advice Charley gave to Iris,? Is
to gain some consensus from higher management to fund the new Security Analyst
position. Why? Currently, Iris is overwhelmed with the new and undefined CISO
position. Also, a qualified Secuity Analyst would free her to work on planning strateges
to develop a more secure, stable information security evironment for the company.