Preview

Is 411 Study Guide

Satisfactory Essays
Open Document
Open Document
305 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is 411 Study Guide
IS 411 Study Guide – Final

Section 1.
Why are IS Security Policies Important - pages 15 – 16
When do You Need IS Security Policies – pages 17-18
What are IS Security Policies – pages 11-13
Educate Employees and Drive Security Awareness p 30-31
Implementing Policies to Drive Operational Consistency – p 39-41

Section 2.
Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83
Human Nature in the Workplace - Page 90
Selling Information Security Policies to an Executive - Page 104

Section 3.
What is an IT Policy Framework - Page 127-128
What is a Program Framework Policy of Charter - Page 128
Information Assurance Considerations - Page 142-143
What is Information Assurance -Page 6-7
Awareness and Training - Page 169-170

Section 4.
Roles, Responsibilities and Accountability for Personnel -187-188
Separation of Duties (SOD)- Page 191 - 193

Section 5.
Auditors – Page 218-219
Acceptable Use Policy (AUP) - Page 220
Privileged Access Agreement (PAA) - Page 220 – Contractors and temporary workers sign this type of document.
Security Awareness Policy (SAP)- Page 221

Section 6.
Anatomy of an Infrastructure Policy - Page 234
LAN Domain Policies - Page 239-240
Baseline Requirements - Page 242
Guideline - Page 243
WAN Domain Policies - Page 246-247

Section 7.
Business Impact Analysis – Page 278-279
Recovery Time Objectives - Page 287
Disaster Declaration Policy - Page 288

Section 8.
Incident Response Team Policies - Page 296
Incident Response Policy – 298-299
PCI Incident Classification - Page 299
Incident Response Team Members - Page 302
Reporting an Incident - Page 308

Section 9.
Implementation Issues - Page 321
Organizational Challenges – Page 323
Organizational and Individual Acceptance - Page 325
Conducting Security Awareness Training Sessions - Page 329
Organizations Right to Monitor User Actions - Page 356

Section 10.
Defining a Baseline Definition -

You May Also Find These Documents Helpful

  • Powerful Essays

    412 Study Guide

    • 19517 Words
    • 79 Pages

    Tax Fiscal Year. A business will often use a tax fiscal year that coincides with its natural business year. This enables the business to better match revenues and expenses. For example, a retailer with a fiscal year ending January 31st can process after-Christmas returns and can hold clearance sales before measuring income for the year.…

    • 19517 Words
    • 79 Pages
    Powerful Essays
  • Satisfactory Essays

    SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Choicepoint

    • 3729 Words
    • 15 Pages

    Based in Alpharetta, Georgia, ChoicePoint was formerly a struggling insurance services unit of Equifax. Derek Smith successfully trimmed its labor-intensive operations and replaced them with technologically based ones, which resulted in both higher growth and higher margins. This allowed the company to spin off from Equifax and become publicly traded in 1997.…

    • 3729 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Security has become increasingly complex, and is an important consideration when building, upgrading, and maintaining the hardware, software, and infrastructure of an information technology department. Security contains many aspects. Physical security, virtual security, data integrity, accountability, business continuity, and auditing are among topics that address different security aspects and concerns. Security must be addressed not only regarding internal users and issues, but must also be resolved from external threats that are presented when connecting an organization’s network to the Internet and various external customers, vendors, and outside agencies. This paper will distinguish between internal and external threats to the physical locations where resources are located, as well as the virtual resources that are accessible electronically from inside or outside of the organization. Strategies that are used to protect the physical and virtual resources will also be presented, as well as how those threats are defined and distinguished. As the capabilities and complexity of information technology systems have progressed, security has evolved into a specialized information technology field of study. The importance of building and maintaining the proper security controls can have a direct correlation to the success or failure of an organization.…

    • 1833 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Customer-facing services appear in the service catalog, and supporting services appear in the service portfolio.…

    • 791 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Govt Ethics

    • 1775 Words
    • 8 Pages

    Swartz, N. (2004). Businesses Improve Cyber Security. Information Management Journal, 38(6), 18. Retrieved from EBSCOhost…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Peltier, T. R. ( (2002)). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Cis Studyguide

    • 1150 Words
    • 5 Pages

    Figure 1-1 shows that information security includes the broad areas of information security management (the topic of this book), computer and data security, and network security. At the heart of the study of information security is the concept of policy (discussed in detail in Chapter 4). Policy, awareness, training, education, and technology are vital concepts for the protection of information and for keeping information systems from danger.…

    • 1150 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Finally, as security failures increasingly impact on individual consumers and citizens, there is a developing regulatory agenda, particularly around the security of personal information. As a result, a business may need to shift its thinking from internal risk management to meeting external demands. (1)…

    • 782 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The objective posed in every information security policy is that of data protection through a thorough definition of procedures, practices and guidelines for the practical configuration and information security management in the entire corporate environment. The policy therefore defines the organization’s orientation in regard to philosophy and the actual requirements for securing the information assets. Again, the policy outlines its applicability to all stakeholders, the processes and the environments subject thereto.…

    • 2847 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Recent Security Threats

    • 1681 Words
    • 7 Pages

    Every individual and organization is aware of security threats and how important it is to secure and protect its data. Not only its date, but also its surroundings, security of the building, its employees, and assets are, or should…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    Information Security as a field is increasing in demand, for most of the companies spend increasingly larger percentages of their budgets trying to manage or stop the risks and threats. It is important to have information security for it can maintain a clear perspective of all the areas of business that need protection.…

    • 1955 Words
    • 8 Pages
    Powerful Essays