COMPLETE SOLUTIONS VERIFIED GRADED A++
ISO15408
Common Criteria
ISO 15489
Records Management and Retention of Records
ISO 18028
Information Technology
ISO 27002
Code of Practice for Information Security Management
ISO 27003
ISMS Implementation Guide
ISO 27005
Risk Management
ISO 31000
Risk Management
NIST 800-53
Cyber Security Framework
AAA
Authentication
Authorisation
Accountability
, Risk =
likelihood x impact
probability x consequence
Quantitative Calculation
recorded metrics, statistics
Qualitative Calculation
no firm evidence/metrics, subjective
Deming Cycle
continuous reviewal of risk
4 T's of Risk Management
Treat
Transfer
Tolerate
Terminate
NIST Cybersecurity Framework
Identify, Protect, Detect, Respond, Recover
Directive Controls
tell people what to do
Detective Controls
identify and record attempted or successful intrusion
Preventive Controls
eliminate or reduce the likelihood that an attack will succeed
Corrective Controls