Information Security Chapter 4
Information Security Chapter 4
Information Security Chapter 4
Chapter #4
Planning for Security
Agenda
• Introduction
• Continuity Strategies
Introduction
• An organization’s information security effort succeeds only when it
operates in conjunction with the organization’s information security
policy.
Key Terms:
Key Terms:
• Strategic plans are used to create tactical plans, which in turn are
used to develop operational plans.
Terms:
Terms:
Classwork:
Defense-in-depth:
Strong Deploy
Firewalls Encryption
Vulnerability
Multi-factor Implementing
assessment
Authentication EDR solutions
b/n WS & DB
(MFA)
The Information Security Blueprint | Security Architecture
Security Education, Training, and Awareness Program
2. Detection:
3. Reaction
3. Reaction
Terms:
3. Reaction
Terms:
• The ultimate containment option, which is reserved for only the most
drastic scenarios, involves a full stop of all computers and network
devices in the organization. This step is taken only when all control of
the infrastructure has been lost.
Continuity Strategies | Contingency Planning (CP)
• Taking down the entire system, servers, and network may accomplish
this objective. The incident response manager, with the guidance of
the IR plan, determines the length of the interruption.
Continuity Strategies | Contingency Planning (CP)
4. Recovery
• Once the incident has been contained and control of the systems is
regained, the next stage of the IR plan is incident recovery.
4. Recovery
Terms:
4. Recovery
Terms:
• All key players review their notes and verify that the IR
documentation is accurate and precise.
• All contingency planners live by the following words: “plan for the
worst and hope for the best”.
End Chapter 4