mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-30 08:14:05 -06:00
vault backup: 2022-09-21 12:54:30
This commit is contained in:
parent
360b21f0a5
commit
f359dba0b3
@ -4,6 +4,9 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- comp210
|
- comp210
|
||||||
- lecture
|
- lecture
|
||||||
|
sr-due: 2022-09-24
|
||||||
|
sr-interval: 3
|
||||||
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
# news
|
# news
|
||||||
@ -30,18 +33,72 @@ provide roadmap for day-to-day operations
|
|||||||
- dont often change or deteriorate when staff changes
|
- dont often change or deteriorate when staff changes
|
||||||
- evidence of quality control, internal audits etc
|
- evidence of quality control, internal audits etc
|
||||||
|
|
||||||
## good policies are
|
## good policies
|
||||||
|
are properly
|
||||||
- disseminated
|
- disseminated
|
||||||
- read
|
- read
|
||||||
- understood
|
- understood
|
||||||
- agreed-to
|
- agreed-to
|
||||||
- uniformly enforced
|
- uniformly enforced
|
||||||
|
|
||||||
|
and help us to answer these questions
|
||||||
|
- what info should be collected
|
||||||
|
- how should it be stored
|
||||||
|
- who is responsible for managing it
|
||||||
|
- who can access it
|
||||||
|
- what info should be published
|
||||||
|
- how long should it be kept/maintained
|
||||||
|
- when should it be discarded
|
||||||
|
|
||||||
|
## example
|
||||||
|
Revealing Information To Prospective Employee
|
||||||
|
Policy: Information systems technical details, such as network addresses, network diagrams, and security software employed, must not be revealed to job applicants until they have signed a confidentiality agreement and also have been hired or retained
|
||||||
|
|
||||||
# Procedures
|
# Procedures
|
||||||
Defn: step by step descriptions of what employees must do to achieve a certain goal (as specified by a policy)
|
Defn: step by step descriptions of what employees must do to achieve a certain goal (as specified by a policy)
|
||||||
|
|
||||||
- must be kept separate from policies
|
- must be kept separate from policies
|
||||||
- keeping them together will create a complex document that will (likely) not be read
|
- keeping them together will create a complex document that will (likely) not be read
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
# Standards
|
||||||
|
The ISO 27000 is a global standard to build a Information Security Management System (ISMS)
|
||||||
|
|
||||||
|
## ISO standards
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## IS measurement model - ISO 27004
|
||||||
|
- monitoring
|
||||||
|
- measurement
|
||||||
|
- analysis
|
||||||
|
- evaluation
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
## Capability maturity model integration CMMI
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
# Practices
|
||||||
|
Defn: detailed and repeateable ways of complying to a standard (and to a policy)
|
||||||
|
|
||||||
|
diff with procedures is that a proceduure contains a step by step method on how to complete a certain task
|
||||||
|
|
||||||
|
## examples
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
# Info sec audit
|
||||||
|
- Organisation (Is there a security policy?)
|
||||||
|
- Employee Security Focus (Training, Recruitment)
|
||||||
|
- Change Management Network Security (Router/Firewall, VPN)
|
||||||
|
- Application Security (App Dev., Data Security)
|
||||||
|
- System Security (Server Vulnerability & Hardening)
|
||||||
|
- Identity Management (Account & Password Management)
|
||||||
|
- Event Management (Incident Response)
|
||||||
|
- Asset Security (Asset Inventory, Laptop Security, Software Management)
|
||||||
|
|||||||
@ -34,4 +34,5 @@ No final exam
|
|||||||
- [07-cryptography-applications](notes/07-cryptography-applications.md)
|
- [07-cryptography-applications](notes/07-cryptography-applications.md)
|
||||||
- [8-application-security-1](notes/8-application-security-1.md)
|
- [8-application-security-1](notes/8-application-security-1.md)
|
||||||
- [12-pen-testing](notes/12-pen-testing.md)
|
- [12-pen-testing](notes/12-pen-testing.md)
|
||||||
|
- [13-pen-testing-2](notes/13-pen-testing-2.md)
|
||||||
|
- [14-policies-standards-practices](notes/14-policies-standards-practices.md)
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user