100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
College aantekeningen

Information Security Management - Lectures (Decision and Risk Analysis)

Beoordeling
4,0
(1)
Verkocht
18
Pagina's
37
Geüpload op
26-11-2015
Geschreven in
2015/2016

Summary of all lectures of Information Security Management, part of Decision and Risk Analysis. I used the lecture slides and added my notes to clarify these slides and to provide more detail on the various concepts and guidelines mentioned in the slides.

Meer zien Lees minder










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
26 november 2015
Aantal pagina's
37
Geschreven in
2015/2016
Type
College aantekeningen
Docent(en)
Onbekend
Bevat
Alle / all

Onderwerpen

Voorbeeld van de inhoud

INFORMATION
SECURITY
MANAGEMEN
T
Decision and Risk Analysis




Lecture notes and slides

,Information Security Management – Lecture Notes and Slides

Lecture 1

Introduction

Packet switching
Describe the internet with one word: Packet switching.
Packet switching was the basic idea behind arpa net.
If you ‘send’ something, it is divided in packets and these packets are sent
away.
Nowadays there’s just one kind of packet. There are some more, but not
common.

Arpa.net
Arpa net was a project financed by DoD (department of defense).
DoD was the largest investor in projects in defense since WW II.

Bell labs
Bell labs was the big one of one of the big telephone companies in the
United States. They had some labs that were very great in discovering new
items in communicating and computing. Linux is coming from them.

PARC
PARC was a research centre, owned by Xerox. They invented the mouse
and the graphical interface. At first they didn’t do anything with it.

IPv4 Internet protocol
Example: 137.056.xxx.xxx, is TilburgUniversity.edu
Five or six years ago, we didn’t have any addresses left. Thus, al most then
years ago they came up with IPv6. This means 32 digits in stead of 12.
 Zero’s are omitted, but they might add them.

Internet of things:
A lot of other things than computers are connected to the internet. Almost
everybody has three communication devices, so you already need three
addresses. Everything will be connected to the internet. You might be able
to command and manage them from a distance. Companies will do that
with their plants and machinery.

Information security

Cybercrime: when people/groups of people use the internet to get to your
data; thieves.

Why do we need information security ?
 national security
 privacy
 all private and company owned data has to be protected

, We need IS to have reliable data in our society.
If data is not reliable, managers will take wrong decisions because of
wrong data.

Difference between information systems and information technology
Information technology is mainly hardware, software, infrastructure etc.
There’s one element that has to be added before we talk about
information systems: people/organizations. So: hardware, software and
people/organization.

Difference between IT security and IS security
People are the weakest part of all the security. People will not always
exactly do what you tell them to; computers/devices will.

Lecture 2

Information security management

How to create a successful ISM program ?
 Have a good understanding if what the business is about. It has to
be fit for the company.
 Investment analysis. Develop some kind of business case to justify
the money spent on information security.
 To find out what the specifics are of the regulations for our company.
Identify the regular and legal requirements.
 Look for somebody who will agree on the idea. Obtain commitment
of senior management. You need somebody at the top level from
whom you can obtain authority. They have to permit to this program.
 Start finding a structure, including reporting mechanisms and try to
‘roll out’ a program on information security.

 You have to make some structure and define the roles, tasks and
responsibilities throughout the organization, on different levels.

Are there organization that don’t necessarily have to follow all the steps ?
Some organizations have more legal possession to do something. Also,
some organizations already have some security management in place;
they are aware that they have to be precious about some information. Two
obvious ones are hospitals (privacy related data; dangerous operations)
and the petrol chemical industry (production process can’t explode).

Corporate governance
Corporate governance means ‘goed bestuur’ (in Dutch) / ‘good
management’. All the important aspects of good organizations are in the
definition of corporate governance.

Main problem of corporate governance
The principal agency problem. The difference between shareholders and
management.

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
10 jaar geleden

precies wat ik nodig had!

4,0

1 beoordelingen

5
0
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
annemiekvdb Tilburg University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1249
Lid sinds
12 jaar
Aantal volgers
834
Documenten
14
Laatst verkocht
4 maanden geleden

Graduated BSc Bedrijfseconomie (Business Administration), MSc Information Management and MSc Data Science at Tilburg University.

3,7

182 beoordelingen

5
45
4
70
3
40
2
13
1
14

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen