Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Resume

Samenvatting Information Management Standards

Note
-
Vendu
1
Pages
15
Publié le
04-07-2021
Écrit en
2020/2021

Ik heb de Makri handouts gebruikt voor het samenvatten van de gegeven leerdoelen per week. Hierbij heb ik overbodige (althans, in de zin van het tentamen overbodig....) informatie weggelaten en de essentiele punten overgenomen. Gezien ik de leerdoelen heb gebruikt omvat de samenvatting alle informatie die je nodig hebt. Kwartiel 3.4 van de studie Security Management: garantie dat je het tentamen haalt als je deze stof kent.

Montrer plus Lire moins
Établissement
Cours

Aperçu du contenu

Information Management
Standards exam preparation
 Define standard and standardization and explain their important in today’s international
environment
 Name and describe the most prevalent information security standards and information
security models
 Implement security governance in a corporate environment based on good practice
 Understand and be able to apply standard concepts and principles that security operations
should follow
 Describe the main elements of resource protection and employ resource protection in a
corporate environment
 Manage incident response
 Name, describe and decide on preventative measures against attacks

Week 1 Information Management Standards
 Define what a standard is and what is standardization
 Explain the importance of standardization nowadays
 Give a short description of the TCSEC and name tis fundamental objectives and requirements
 Describe the security mechanisms that are applied through the different TCSEC levels.
 Give a short description of ITSEC
 Name and describe the key concepts introduced by the Common Criteria
 Name the main areas of concern of the ISO 27001:2013 standard
 Describe the PDCA cycle introduced by the ISO 27001:2005 standard
 Name and explain the principles of COBIT 5
 Describe BiSL
 Name the rules of the Bell-LaPadula, Biba, and Chinese Wall security models
 Describe the four main entities of the Clark-Wilson integrity model

Week 2 Information Security Governance
 Apply security governance in a given setting
 Name and apply the main suggestions by ITGI (IT Governance Institute) concerning security
 Name and describe the organizational processes that impact security
 Explain the concerns of the security professionals when the aforementioned organizational
processes occur
 Describe the various users’ roles within the context of the organization and their security
responsibilities
 Name the main benefits from establishing clear and unambiguous security roles
 Explain the relationship between legislative and regulatory compliance with the security
professional
 Understand when privacy requirements compliance is desired and name the control
frameworks that support meeting these requirements
 Explain what is due care and what due diligence


Week 3 Security Operations Concepts
 Name and describe the key themes related to the concepts of Security Operations

,  Explain which are the main processes and procedures, where Security Operations plays a
vital role
 Understand how security operations are controlling privileged accounts, and explain what is
identity management and access management
 Describe the need-to-know concept
 Describe the least privilege concept
 Explain the notion of Role Based Access Control (RBAC)
 Name and describe the different types of privileged user accounts
 Explain the principle of Separation of Duties and how it can be applied in practice when
assigning responsibilities in a corporate environment
 Describe what is a clearance and what is its relation to background checks
 Explain what is Job Rotation and which purposes it serves in a corporate environment
 Name the different stages of the sensitive information lifecycle
 Define declassification

Week 4 Employ Resource Protection
 Discern between tangible and intangible assets, and identify combinations thereof
 Critically examine whether a physical or non-physical asset needs to be protected and to
which extend
 Name the main facilities systems and controls that support the IT operation
 Explain how and why hardware should be physically protected
 Name and describe the main protection measure for storage media
 Explain what is software licensing and what is its relevance to security in a corporate
environment
 Name the most important elements of a secure removable media solution
 Explain the difference between backups and archives
 Describe the security related considerations concerning backups and archives
 Explain what makes media disposal important, and name the three main means of media
disposal or reuse
 Describe the equipment lifecycle and the relation of each phase to security

Week 5 Manage Incident Response
 Define the term Incident Response Management
 Name the key actors in an incident management program and their characteristics, that
make the program successful
 Identify the relation between the incident management process and measurements, metrics,
and reporting
 Determine the measures that are important in a given incident scenario, so as to facilitate
successful security operations
 Name and describe the most prevalent boundary controls and detection mechanisms
 Identify the advantages and disadvantages of each detection approach and decide on the
most adequate mechanisms in a given setting
 Name the most important aspects of Incidence Response and devise a step-by-step
procedure of response in a given scenario
 Identify and answer all the questions relevant to the incident reporting procedure, that
should be included in the formal policies or procedures of an organization
 Explain what is the added value of reviews and audits for an organization
Week 6 Preventative Measures against Attacks
 Name and describe the common threats against the CIA (Confidentiality, Integrity,
Availability) triad of security requirements

École, étude et sujet

Établissement
Cours
Cours

Infos sur le Document

Publié le
4 juillet 2021
Nombre de pages
15
Écrit en
2020/2021
Type
RESUME

Sujets

5,99 €
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
securitytopper Saxion Hogeschool
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
82
Membre depuis
6 année
Nombre de followers
65
Documents
0
Dernière vente
9 mois de cela
Security Management (& Integrale Veiligheidskunde) samenvattingen

Ik ben een zeer gemotiveerde en ambitieuze vierdejaars student Security Management. Samenvatting van mij afkomstig, zijn gegarandeerd van de hoogst mogelijke kwaliteit. Er wordt nooit stof weggelaten of overgeslagen. Een samenvatting omvat alle informatie die jij nodig hebt om je tentamens te halen.

4,2

9 revues

5
3
4
5
3
1
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions