Unlock the full potential of your projects.
Try MeisterTask for free.
Não tem uma conta?
Criar conta gratuita
Navegar
Mapas em destaque
Categorias
Gerenciamento de projetos
Negócios e metas
Recursos Humanos
Brainstorming e Análise
Marketing e Conteúdo
Educação e Notas
Entretenimento
Vida
Tecnologia
Design
Resumos
Outro
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Outro
Exibir mapa completo
Copiar e editar mapa
Copiar
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY
Outro
JT
Jaclyn Toi
Seguir
Intro to info security
Começar.
É Gratuito
Cadastrar-se com Google
ou
inscrever-se
com seu endereço de e-mail
Mapas mentais semelhantes
Esboço do mapa mental
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY
por
Jaclyn Toi
1. 7 critical characteristics of informations
1.1. 1. Availability
1.2. 2. Accuracy
1.3. 3. Authenticity
1.4. 4.Confidentiality
1.5. 5. Integrity
1.6. 6. Utility
1.7. 7. Possession
2. 6 Components of info system
2.1. 1. Hardware
2.2. 2. Software
2.3. 3. People
2.4. 4. Database
2.5. 5. Procedure
2.6. 6. Network
3. Approaches to info system implementation
3.1. 1. Top-down
3.2. 2. Bottom-down
4. Why is methodology imp in info security?
4.1. 1. ensures development is structured in an orderly manner
4.2. 2. employees can follow the steps, eliminate mistakes
4.3. 3. increase probability of success
5. The Security system Development Life Cycle
5.1. Step 1: Investigation
5.2. Step 2: Analysis
5.3. Step 3: Logical Design
5.4. Step 4: Physical Design
5.5. Step 5: Implementation
5.6. Step 6: Maintenance and Change
6. Information Security Project Team
6.1. 1. Champion
6.2. 2. Team Leader
6.3. 3. Security Policy Developers
6.4. 4. Risk Assessment Specialist
6.5. 5. Security Professionals
6.6. 6. System Administrators
6.7. 7. End Users
7. What is security?
7.1. The quality or state of being secured, to be free from danger
8. 6 Layers of security a successful org should implement (NOICPP)
8.1. 1. Network
8.2. 2. Operation
8.3. 3. Information
8.4. 4. Communication
8.5. 5. Personal
8.6. 6. Physical
9. 5 essential tools a company should use to achieve security
9.1. 1. Policy
9.2. 2. Awarewness
9.3. 3. Training
9.4. 4. Educations
9.5. 5. Technology
10. 3 components of the CIA triangle
10.1. 1. Confidentiality
10.2. 2. Integrity
10.3. 3. Availabilty
11. Not possible to achieve perfect security
11.1. Security should be considered a balance between protection and availability
12. Members involve in security system development
12.1. Upper Management
13. Senior Management
13.1. Chief Information Officer (CIO)
13.2. Chief Information Security Officer (CISO)
Comece Já. É grátis!
Conectar-se com Google
ou
Inscrever-se