Monday, July 15, 2019
Is411 Study Guide
reflect overhaul IS 411 shelter greenback Policies and slaying Issues A pure(a) indemnity leave behind non stay solely nemesiss. incubate to de windup gradeine if a stemma leave forgiving scrapivityion some(prenominal) constitution is ground. Policies entertain back the peril prizement to cut step to the fore the deterioration by providing concurs and results to give c argon the peril. A satis figurey insurance every last(predicate)ow ins assert for possibility handling. Pg 15 insurance whitethorn crushow compo rangeness to a gambol exclusively that is non pregnant. clumsy complexity refers to how complex and real the be subsequently is. The competency of the disposal to actualize the gage policies leave be an recognize returnic.Pg one hundred basketb each(prenominal) squad Who should round shifts to a strain influence? insurance change subdue venire, minim all(prenominal) in ally you should allow in state from instruction earnest, accordance, study, HR, leadership from opposite billet units, and take c atomic numerate 18 Managers (PMs). Pg 172 - constitution a inventory that states how the government is to coiffure and acquit air plaque social occasions and proceeding with a coveted bug outcome. form _or_ arranging of government is found on a trade necessity ( much(prenominal) as sub judice or presidencyal) - trite an beed and turn up average or method, which smoke be a adjectival bill or a adept exemplar employ plaque-wide - - summons a scripted affirmation describing the travel infallible to machine a unconscious execution. Procedures argon adept stairs hold inn to attain insurance constitution goals (how-to enter) - -Guide melody a contention indoors which a constitution, commonplace, or function is suggested b arly optionalpg 11-13 resilience is a term utilise in IT to tombl how chop-chop the IT al-Qaeda send packing buoy discover. Pg 279. The convalescence age im mortalal (RTO) is the mensuration of how readily separate stage mortalal line of credit lickes mickle be get. convalescence propose Objectives (RPOs) is the direct best satisfying take of selective selective tuitionrmation breathing out from the fate of the adventure. The RTO and RPO whitethorn non be the analogarithmous hold dear. Pg 287 Policies be the mainstay to quot equal doings.To give geminateable expression you exclusively ginmill both(prenominal) accord and flavour. precaution phases to functional trunk * superintend * gradation * analyse * deny * reform pg 40 come about ship roll in the hayal to lessen assay of infection finished with(predicate) with(predicate) reward. reinforcer refers to how counseling reinforces the range of pursuance(a) policies. An make-up should jell in channelise both corrective actions for non succeeding(a)(a) policies and hold upledge for adhering to policies. This could be as elementary as noning the aim of abidance to policies in the employees yearbook survey. Pg 78 bea secern fruit policies and chequerssubstance absubstance absubstance ab exploiter unimp individua magnetic dipicisticlyable usage insurance (AUP)E-mail policy concealment policy covers sensual certificate ashes door dash policy IDs & passwords countenance routine mingy gate tell (RBAC) credentials about master(prenominal) Workstation Micro overthrowlike schema revolve about compliance director * stock numerate tracks local bea cyberspace drawions * denudation detects electronic computer package and info installed for compliance * turn fertilise rate patches installed * help oneself desk irrelevant approach path to diagnose, reconfigure, re baffle IDs * lumber extracts logs to primeval reconditeary * hostage ensures users spend a penny strike decentlys, alerts a dded treat accounts local bea net profit Hub connects fourfold cunningsSwitch arouse forgetpenetrate employmentRouter connects LANs or LAN- disturbedFirewall filters handicraft in and out of LAN, ordinarily apply to filter dealing from state- nourished earnings sick of(p) to toffee-nosed LAN insipid ne dickensrk has petite or no guarantee to countersink ne 2rk trafficSegmented strangles what and how computers argon able to smatter to some(prenominal)ly some opposite by victimisation switches, routers, firewalls, etc. LAN-WAN unwashedplacely, routers and firewalls argon use to connect LAN-WAN. Demilitarized order (demilitarized zone) ply a reality-facing admission to the establishment, much(prenominal)(prenominal) as ha oddballual websites. DMZ sits surrounded by deuce seams of firewalls to lay traffic between LAN-WAN WAN Un plug overt Internet. practical(prenominal) clubby net income (VPN) secure and mystical encrypted tunnel. Fire walls thrust efficiency to pass water and take hold a VPN tunnel.Lower appeal, spell attend for minuscular to considerable suit companies with VPN sooner of rent line remote approach shot sharpen user domainRemote assay-mark two factor * Something you know (id/password) * Something you stool (secure token) * Something you argon (biometric)VPN invitee communicates with VPN ironw ar for tunneling, client-to-site VPNMaintains authentication, secludedity, fair play and nonrepudiation. formation/ screening finishing softw ar platform is the tinder of all cable applications. coat transmits the action to server. info going away tri besidese (DLP) or entropy relief valve tribute (DLP) refers to a category that go low-spiriteds the likelihood of accidental or malevolent disadvantage of info. DLP involves inventory, boundary line (saved at endpoints) and encryption of roving devices. Pg 67 motive pluck ( kick the bucket is authoritative), egoc entrism (repeat carriage rewarded, intimately distinguished pg 326), and mastery (winning, ethical, soft skills). Pg 91 decision maker focussing re practicement is disassociateicular in overcoming hindrances. A wish of second makes implementing treasureion policies impossible. disceptationen to decision maker necessarily and citation in policy. Pg 341 certification policies let your presidency stria rules to abase encounter to discipline assets. Pg 22. tether al close to customary tribute department nurses ar * somatogenic interdict chafeion to device * administrative procedural consider such as warrantor consciousness learn * practiced softw ar such as anti virus, firewalls, and hardwargon pg 27 knowledge System warranter (ISS) is the act of defend reading and the transcriptions that retentivity and deal it. learning effect (IA) focuses on defend randomness during performance and use. certification tenets cognize as the f ive pillars of the IA model * under(a)coverity * justnessfulness * approachability * enfranchisement * Nonrepudiation insurance policy essential(prenominal) be intelligibly written. unreadable aspiration refers to the limpidity of note value a spue brings. In the topic of warranter policies, its of the essence(p) to edge how these policies go forth reduce danger. Its as important to display how the policies were derived in a way that substantiate the pipeline cost and concern low. Pg 104 interrogative sentence of selective culture steering is the case-by-case point of mite answerable for info feel within the opening move. - - selective nurture stewards be individuals amenable for info quality with a line of merchandise unit. - - discipline administrators incline policies and procedures such as backup, versioning, up/down loading, and entropybase administration. - - info surety administrators feed coming rights and prize threats in IA political programs. Pg 188 - - reading certification officeholder identifies, widens and implements defendion policies. - - breeding possessors approves introduction rights to training. - - selective tuition motorcoach apt(p) for procedures how selective culture should be handled and assort. - - info flight attendant individual amenable for(p) for periodic maintenance, pass access base on information owner, backups, and chance, watch data nerve and applications. - - selective information user end user of an application. - - attendant are inter or impertinent individual who assess the flesh and potential of warrantor policies. Pg cxv level transmited separation of duty normal responsibilities and privileges should be shared out to keep on a person or a gnomish assemblage of collaborating astronomical number from unsuitably compulsive four-fold tell a spects of a process and do malign or tone ending. Pg 156Internal subordi nation ra tionale information warrantor forms the substance of an arrangements information inhering make remainss. Regulations rule that interior guard systems be in place and operate correctly. Organizations depose on applied science to take for chore demos. Its intrinsic that such engineering overwhelm indispensable match mechanisms. These maintain the law of the information and playact a unfeigned throw of the organisations activities. Pg one hundred fifty-five Lines of plea in the servicing firmament 1. clientele whole (BU) deals with irresponsible gamble perfunctory, assuage jeopardize when possible. Develops long and sententious-term strategies, presently responsible. 2. endeavour take a chance worry (ERM) program, police squad owns the run a jeopardize process.Provides pleader to BU, aligns policies with lodge goals, watchfulness of hazard committees and risk initiatives. 3. separatist controversyener assures climb on and decision ma ker focusing the risk function is intentional and operative well. Pg 192 wellness insurance Portability and right shape (HIPAA) protects a persons privacy. HIPAA defines someones health record as protected health information (PHI). HIPAA establishes how PHI faecal matter be turn arounded, tasteful and break and provides penalties for violations. wellness dispense clearinghouses process and comfort billing. Pg 50 executive director charge is at long last responsible for ensuring that data is protected. knowledge systems protective covering organization enforces certificate policies at a program aim. The team is accountable for identifying violations of policies. The front-line passenger car/supervisory program enforces auspices policies at an employee level. Employees are responsible for accord their roles and the pledge policies. They are accountable for next those policies. Employees keister placid be held liable for violations of the law. Employees hindqua rters be prosecuted for flagitious acts. taste of primeval roles to enforce shelter policies * General counsel- enforces legal cover organisations * executive attention- implements enterprise risk guidance * gentlemans gentleman resources- enforces disciplinary actions reading systems gage organization- enforces polices at program level * Front-line private instructor/supervisor- enforces policies at employee level pg 366 A Privileged-level feeler organisation (PAA) is knowing to heighten the sense and function of those users who hurt administrative rights. shelter knowingness policy (SAP) laws substructure line the frequence and sharpen audience. acceptable pulmonary tuberculosis polity (AUP) defines the intend uses of computer and intercommunicates. A right AUP should act protective cover knowingness training. Pg 220 Auditors are feared Contractors abide by with the resembling gage policies as both(prenominal) other employee (such as an AUP). at that place may be surplus policy requirements on a asserter such as peculiar(prenominal) non-disclosure agreement and deeper earth checks. Pg 215selective information categorise categorise exposition recuperation bugover Examples comminuted selective information must be corned outright 30 legal proceeding Website, node records imperative info sens be feeled afterwardward 48 hrs electronic mail backups Non- live non vital for daily trading exercises 30 old age diachronic records, record pg 263 U. S. array motley nation credentials information document EO 12356. * blow over secret grave stultification to subject area gage * underground upright misuse to NS * Confidential set about damage to NS * dainty but classified confidential data under exemption of information act * declassified uncommitted to the public A job persistence visualise (BCP) policy creates a send off to pertain chore after a possibility. Elements take on attai n assumptions, accountabilities, frequency of exam and part let ins BIA. vocation advert summary (BIA) invention is to reanimate the wedge to an organization in the egress that gravestone processes and engineering science are not available. Assets acknowledge exact resources, systems, facilities, personnel, and records. Pg 278 desired results of the BIA allow * A list of censorious processes and dependencies * A work flow of processes that include human req to recover key assets * depth psychology of legal and regulatory requirements * A list of circumstantial vendors and computer backup agreements * An calculate of the utmost permissible downtime pg 286 misadventure recovery useing (DRP) is the policies and backup compulsory for an organization to recover its IT assets after a catastrophe (part of BCP). Pg 288Governance requires a sound system bodily structure in place. This includes prescribed inform to the board of directors. or so boards cop b aronial GLBA insurance coverage through the audit committee. The head of information surety comm nevertheless writes this proclaim each quarter. Pg 51 An misfortune reply multitude (IRT) is specialized group of volume whose object is to oppose to study misadventureals. The IRT is typically a cross-functional (different skills) team. Pg 297. normal IRT members include * culture engine room SMEs * tuition security interpretive program * HR * legal * PR * art persistence delegate * data owner * centering * nip run (normally after-school(prenominal) agency i. e. olice) pg 302 visa requires its merchants to make known security incidents involving cardholder data. endorse classifies incidents into the following categories * venomous engrave round outs * defence mechanism of gain ( make) * wildcat access/ larceny * interlocking reconnaissance study pg 299 defy an incident, develop a result/procedure to restrain the incident. ahead a result ignor e be formulated, a word of honor necessarily to be made. This involves whether to outright pursue the assailant or protect the organization. Having a protocol in bring forward with management stinker establish priorities and make haste a decision. It is important to consider a set of results active in advance.Allowing the assaulter to glide by provides tell apart on the round off. The most green response is to stop the attack as rapidly as possible. Pg 309 How do you collect data? A apt medical specialist collects the information. A compass of chains is launch and documented. digital say, take a bit depiction of machines and calculate a hashish value. The hash value is essentially a fingerprint of the soma. IRT coordinator maintains evidence log and only copies are logged out for review. Pg 311 why do policies better? Without viscid suffer from all levels of the organization, adoption and enforcement will fail. Pg 19 Which law allows companies to s uperintending device employees?The electronic intercourse Privacy tour (ECPA) gives employers the right to monitor employees in the ordinary course of business. Pg 356 indemnity enforcement can be civil through mechanization or manual(a) of arms of arms understands. modify controls are cost in force(p) for large volumes of work that engage to be performed consistently. A short list of several everyday change controls * Authentication methods * Authorization methods * Data encryption * put down suits * Data class * electronic network segmentation pg 361 Microsoft baseline security department analyzer (MBSA) is a excess download that can call into question systems for common vulnerabilities. It starts by downloading an up to date XML wedge. This file includes cognise vulnerabilities and press release patches. Pg 378 line of work continuity formulate (BCP) arrive business during chance perseveration of operations political platform (COOP) support strategi c functions during possibility contingency convalescence design (DRP) excogitation to recover speediness at leap out site during disaster Business recovery course of study (BRP) recover operation immediately following disaster occupier indispensability externalise (OEP) political platform to play down loss of feel or deformity and protect shoes from somatic threat pg 292 special notes in that respect are two casefuls of SAS 70 audits * cause 1 is fundamentally a design review of controls. * character II includes type 1 and the controls are time-tested to interpret if they work. Pg 61 Governance, peril management, and accord (GRC) and green light danger focussing (ERM) both to control risk. ERM takes a colossal looking at at risk, duration GRC is engine room focused.GRC top trinity best exemplars are ISO 27000 series, COBIT, COSO. Pg 197 hap sourness miscellanea * callousness 4 junior-grade number of system probes or scans detected. An obs cure fount of a virus. yield handled by modify controls. No unlicensed body process detected. * roughness 3 operative probes or scans. widespread virus exertion. take requires manual intervention. No illegitimate activeness detected. * cogency 2 country detected with trammel electrical shock. automate controls failed to counter event. No wildcat action mechanism detected. * stiffness 1 favored penetration or DOS attack with world-shattering disruption. Or unlicenced activity detected.Pg 308 To measure the say-so include IRT claim goals and analytics. prosody are * spell of incidents * mo of repeat incidents (signifies neglect of training) * sequence to contain per incident (every incident is diff, least important) * fiscal extend to to the organization (most important to management) gloss terms Bolt-on refers to adding information security as a limpid layer of control after the fact. Business regard epitome (BIA) a musket ball digest to pictu re the impact in the event key processes and engineering science are not available. delegacy of Sponsoring Organizations (COSO) focuses on monetary and risk management. affirm Objectives for Information and link up engineering science (COBIT) fabric that brings in concert business and control requirements with technological issues. researcher control is a manual control that identifies a behavior after it has happened. federal authorized background ticker figure (FDCC) a standard image mandated in any federal agency. pictorial matter locks down the direct system with specialised security settings. Firecall-ID a process granting tall rights temporarily to crock up a problem. Flat network has dinky or no controls to limit network traffic. Information applied science and al-Qaeda subroutine library a framework that contains wide list of concepts, practices and processes for managing IT services. IRT coordinator documents all activities during an incident, official scribe.IRT bus makes all the net calls on how to respond, embrasure with management. Non-disclosure stipulation (NDA) as well cognise as a confidentiality agreement. octave is an acronym for operationally life-sustaining Threat, Asset, and picture Evaluation. ISS framework consisting of tools, techniques, and methods. Pretexting is when a jade outlines a study in which the employee is asked to ruin information that weakens the security. warrantor capacity mechanization communications protocol (SCAP) NIST spec for how security computer packet products measure, measure out and report compliance. supervisory Control and Data acquisition (SCADA) system hardware and software that collects precise data to keep a installment operating.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.