mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
vault backup: 2022-09-21 12:54:30
This commit is contained in:
parent
360b21f0a5
commit
f359dba0b3
@ -4,6 +4,9 @@ aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
sr-due: 2022-09-24
|
||||
sr-interval: 3
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
# news
|
||||
@ -30,18 +33,72 @@ provide roadmap for day-to-day operations
|
||||
- dont often change or deteriorate when staff changes
|
||||
- evidence of quality control, internal audits etc
|
||||
|
||||
## good policies are
|
||||
## good policies
|
||||
are properly
|
||||
- disseminated
|
||||
- read
|
||||
- understood
|
||||
- agreed-to
|
||||
- uniformly enforced
|
||||
|
||||
and help us to answer these questions
|
||||
- what info should be collected
|
||||
- how should it be stored
|
||||
- who is responsible for managing it
|
||||
- who can access it
|
||||
- what info should be published
|
||||
- how long should it be kept/maintained
|
||||
- when should it be discarded
|
||||
|
||||
## example
|
||||
Revealing Information To Prospective Employee
|
||||
Policy: Information systems technical details, such as network addresses, network diagrams, and security software employed, must not be revealed to job applicants until they have signed a confidentiality agreement and also have been hired or retained
|
||||
|
||||
# Procedures
|
||||
Defn: step by step descriptions of what employees must do to achieve a certain goal (as specified by a policy)
|
||||
|
||||
- must be kept separate from policies
|
||||
- keeping them together will create a complex document that will (likely) not be read
|
||||
|
||||

|
||||

|
||||
|
||||
# Standards
|
||||
The ISO 27000 is a global standard to build a Information Security Management System (ISMS)
|
||||
|
||||
## ISO standards
|
||||

|
||||
|
||||

|
||||
|
||||
## IS measurement model - ISO 27004
|
||||
- monitoring
|
||||
- measurement
|
||||
- analysis
|
||||
- evaluation
|
||||
|
||||

|
||||

|
||||
|
||||
## Capability maturity model integration CMMI
|
||||
|
||||

|
||||
|
||||
# Practices
|
||||
Defn: detailed and repeateable ways of complying to a standard (and to a policy)
|
||||
|
||||
diff with procedures is that a proceduure contains a step by step method on how to complete a certain task
|
||||
|
||||
## examples
|
||||

|
||||

|
||||

|
||||
|
||||
# Info sec audit
|
||||
- Organisation (Is there a security policy?)
|
||||
- Employee Security Focus (Training, Recruitment)
|
||||
- Change Management Network Security (Router/Firewall, VPN)
|
||||
- Application Security (App Dev., Data Security)
|
||||
- System Security (Server Vulnerability & Hardening)
|
||||
- Identity Management (Account & Password Management)
|
||||
- Event Management (Incident Response)
|
||||
- Asset Security (Asset Inventory, Laptop Security, Software Management)
|
||||
|
||||
@ -34,4 +34,5 @@ No final exam
|
||||
- [07-cryptography-applications](notes/07-cryptography-applications.md)
|
||||
- [8-application-security-1](notes/8-application-security-1.md)
|
||||
- [12-pen-testing](notes/12-pen-testing.md)
|
||||
|
||||
- [13-pen-testing-2](notes/13-pen-testing-2.md)
|
||||
- [14-policies-standards-practices](notes/14-policies-standards-practices.md)
|
||||
|
||||
Loading…
Reference in New Issue
Block a user