LectureNotes IASEC2
LectureNotes IASEC2
Non-substantial
The need for skilled workers and allocation of funds for security within their
budget: Companies are making the effort to allocate more funds in their budgets
for security.
True
Salary: $95,510
Responsibilities: Information security analysts monitor their companies’ computer
networks to combat hackers and compile reports of security breaches.
True
What jobs in information security is this?
Salary: $104,000
Responsibilities: Create an in-office network for a small business or a cloud
infrastructure for a business with corporate locations in cities on opposite coasts.
True
$103,560
Responsibilities: Software developers can be tasked with a wide range of
responsibilities that may include designing parts of computer programs and
applications and designing how those pieces work together.
Software developer
Regulatory compliances
$139,000
Responsibilities: Information systems managers work toward ensuring a
company’s tech is capable of meeting their IT goals.
PRELIM EXAM:
lOMoARcPSD|9452196
The Layer describes the notion that the physical acess to any
system, server, computer, data center, or another physical object storing
confidential information has to be constrained to business ought-to-know.
Physical Access
Confidentiality
consists of changing the data located in files into unreadable bits
of characters unless a key to decode the file is provided.
Encryption
Infrastructure Access
cryptography
confidentiality
lOMoARcPSD|9452196
Enigma
Confidentiality
Data In Motion
Application Access
CIA stands for , integrity, and availability and these are the
three main objectives of information security.
confidentiality
lOMoARcPSD|9452196
information
CIA triad
physical data
The weight given to each of the three major requirements describing needs for
information security—confidentiality, integrity, and availability—depends
strongly on
circumstances
Early disclosure may jeopardize advantage, but disclosure just
before the intended announcement may be insignificant.
competitive
A that must be restored within an hour after disruption
represents, and requires, a more demanding set of policies and controls than
does a similar system that need not be restored for two to three days.
lOMoARcPSD|9452196
system
is a requirement whose purpose is to keep sensitive information from being
disclosed to unauthorized recipients.
confidentiality
With attacks, for example, even legitimate and honest users of an
owner mechanism can be tricked into disclosing secret data.
Trojan horse
The framework within which an organization strives to meet its needs for
information security is codified as
security policy
To be useful, a must not only state the security need (e.g., for
confidentiality—that data shall be disclosed only to authorized individuals), but
also address the range of circumstances under which that need must be met and
the associated operating standards.
security policy
may prevent people from doing unauthorized things but cannot prevent them
from doing things that their job functions entitle them to do.
Technical measures
Some are explicitly concerned with protecting information and
information systems, but the concept of management controls includes much
more than a computer's specific role in enforcing security.
lOMoARcPSD|9452196
management controls
Computers are entities, and programs can be changed in a
twinkling, so that past happiness is no predictor of future bliss.
active
An effective controls is needed to cover all aspects of
information security, including physical security, classification of information,
the means of recovering from breaches of security, and above all training to
instill awareness and acceptance by people.
program of management
A is a concise statement, by those responsible for a system
(e.g., senior management), of information values, protection responsibilities,
and organizational commitment.
security policy
In any particular circumstance, some threats are more probable than others,
and a must assess the threats, assign a level of concern
to each, and state a policy in terms of which threats are to be resisted.
prudent policy setter
are the mechanisms and techniques—administrative, procedural, and
technical—that are instituted to implement a security policy.
Management controls
A major conclusion of this report is that the lack of a clear
of security policy for general computing is a major
impediment to improved security in computer systems.
articulation
lOMoARcPSD|9452196
Cybersecurity
The process to protect that data requires more advanced IT
security tools
Info security is concerned with making sure data in any form is kept secure and is
a bit broader than
Cybersecurity
If your data is stored physically or digitally, you need to be sure you have all
the right in place to prevent unauthorized
individuals from gaining access.
fusion
lOMoARcPSD|9452196
Both individuals need to know what data is most critical to the organization
so they can focus on placing the right and
monitoring controls on that data.
information security
Because ratings are easy to understand, they are a useful mechanism for
and vendor risk to a non-technical audience in the C-suite,
boardroom, or with the vendor in question.
communicating internal
interchangeable terms
lOMoARcPSD|9452196
it pertains to business
Business partners and investors are increasingly aware of the importance of this
topic, and companies are asked regularly about their effectiveness in securing
data and managing both .
Cybersecurity ratings
conversation
information security
lOMoARcPSD|9452196