100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Information Security Management - Lectures (Decision and Risk Analysis)

Rating
4,0
(1)
Sold
18
Pages
37
Uploaded on
26-11-2015
Written in
2015/2016

Summary of all lectures of Information Security Management, part of Decision and Risk Analysis. I used the lecture slides and added my notes to clarify these slides and to provide more detail on the various concepts and guidelines mentioned in the slides.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
November 26, 2015
Number of pages
37
Written in
2015/2016
Type
Class notes
Professor(s)
Unknown
Contains
Alle / all

Subjects

Content preview

INFORMATION
SECURITY
MANAGEMEN
T
Decision and Risk Analysis




Lecture notes and slides

,Information Security Management – Lecture Notes and Slides

Lecture 1

Introduction

Packet switching
Describe the internet with one word: Packet switching.
Packet switching was the basic idea behind arpa net.
If you ‘send’ something, it is divided in packets and these packets are sent
away.
Nowadays there’s just one kind of packet. There are some more, but not
common.

Arpa.net
Arpa net was a project financed by DoD (department of defense).
DoD was the largest investor in projects in defense since WW II.

Bell labs
Bell labs was the big one of one of the big telephone companies in the
United States. They had some labs that were very great in discovering new
items in communicating and computing. Linux is coming from them.

PARC
PARC was a research centre, owned by Xerox. They invented the mouse
and the graphical interface. At first they didn’t do anything with it.

IPv4 Internet protocol
Example: 137.056.xxx.xxx, is TilburgUniversity.edu
Five or six years ago, we didn’t have any addresses left. Thus, al most then
years ago they came up with IPv6. This means 32 digits in stead of 12.
 Zero’s are omitted, but they might add them.

Internet of things:
A lot of other things than computers are connected to the internet. Almost
everybody has three communication devices, so you already need three
addresses. Everything will be connected to the internet. You might be able
to command and manage them from a distance. Companies will do that
with their plants and machinery.

Information security

Cybercrime: when people/groups of people use the internet to get to your
data; thieves.

Why do we need information security ?
 national security
 privacy
 all private and company owned data has to be protected

, We need IS to have reliable data in our society.
If data is not reliable, managers will take wrong decisions because of
wrong data.

Difference between information systems and information technology
Information technology is mainly hardware, software, infrastructure etc.
There’s one element that has to be added before we talk about
information systems: people/organizations. So: hardware, software and
people/organization.

Difference between IT security and IS security
People are the weakest part of all the security. People will not always
exactly do what you tell them to; computers/devices will.

Lecture 2

Information security management

How to create a successful ISM program ?
 Have a good understanding if what the business is about. It has to
be fit for the company.
 Investment analysis. Develop some kind of business case to justify
the money spent on information security.
 To find out what the specifics are of the regulations for our company.
Identify the regular and legal requirements.
 Look for somebody who will agree on the idea. Obtain commitment
of senior management. You need somebody at the top level from
whom you can obtain authority. They have to permit to this program.
 Start finding a structure, including reporting mechanisms and try to
‘roll out’ a program on information security.

 You have to make some structure and define the roles, tasks and
responsibilities throughout the organization, on different levels.

Are there organization that don’t necessarily have to follow all the steps ?
Some organizations have more legal possession to do something. Also,
some organizations already have some security management in place;
they are aware that they have to be precious about some information. Two
obvious ones are hospitals (privacy related data; dangerous operations)
and the petrol chemical industry (production process can’t explode).

Corporate governance
Corporate governance means ‘goed bestuur’ (in Dutch) / ‘good
management’. All the important aspects of good organizations are in the
definition of corporate governance.

Main problem of corporate governance
The principal agency problem. The difference between shareholders and
management.
R66,93
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Reviews from verified buyers

Showing all reviews
10 year ago

just what I needed!

4,0

1 reviews

5
0
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
annemiekvdb Tilburg University
Follow You need to be logged in order to follow users or courses
Sold
1249
Member since
12 year
Number of followers
834
Documents
14
Last sold
4 months ago

Graduated BSc Bedrijfseconomie (Business Administration), MSc Information Management and MSc Data Science at Tilburg University.

3,7

182 reviews

5
45
4
70
3
40
2
13
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions