ISMN- 5730 Test 1 | STUDY GUIDE
Confidentiality
Goals of Information security Integrity
(TRIAD) Availability
, Confidentiality prevent unauthorized access of data, information or systems
Integrity prevent unauthorized modification of data information or systems
Availability prevent disruption of service and productivity for user of data,
information or systems
Functional
IT security requirements
Requirements
Assurance
Requirements
for defining security behavior of the IT product or system
Functional Requirements
ex. the nuts and bolts of the system (types of encryption,
Identity management system)
establishing confidence that the security function will perform as
Assurance Requirements intended
ex. measuring and monitoring activity (is our wireless encryption working
correctly)
intended to direct behavior and describe the firms response
Goal of Organizational Policy
to situations and circumstances that may arise in the
ordinary course of business
Key Components to standards, procedures, baselines, guidelines
implementing policies
Specific hardware and software
Standards
EX. specific anti-virus software, specific encryption algorithm
applied to communications
Confidentiality
Goals of Information security Integrity
(TRIAD) Availability
, Confidentiality prevent unauthorized access of data, information or systems
Integrity prevent unauthorized modification of data information or systems
Availability prevent disruption of service and productivity for user of data,
information or systems
Functional
IT security requirements
Requirements
Assurance
Requirements
for defining security behavior of the IT product or system
Functional Requirements
ex. the nuts and bolts of the system (types of encryption,
Identity management system)
establishing confidence that the security function will perform as
Assurance Requirements intended
ex. measuring and monitoring activity (is our wireless encryption working
correctly)
intended to direct behavior and describe the firms response
Goal of Organizational Policy
to situations and circumstances that may arise in the
ordinary course of business
Key Components to standards, procedures, baselines, guidelines
implementing policies
Specific hardware and software
Standards
EX. specific anti-virus software, specific encryption algorithm
applied to communications