Managing Information Systems Security

Managing Information Systems Security - Managing...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Managing Information Systems Security Developing an Information Systems Security Plan Information systems security plan Risk Analysis a. 9X b. P( , H c. H security breaches \ ( ^ E d. ۹ e. E E3V ( P \ ( Managing Information Systems Security Developing an Information Systems Security Plan Policies and Procedures a. Information Policy b. Security Policy - a , a , a , , oex ( , a - } E ~` P( oeݹ ѹ c. Use Policy x ( S{F @<{ d. Backup Policy - \P( e. Account Management Policy - ~` P( } E @< F n 7e f. Incident Handling Procedures \P( Managing Information Systems Security Developing an Information Systems Security Plan 3. Implementation ,, ,, P( ( S{F S{ p @< @<{F 4. Training ~` P( e@ E plan R ֹE disaster recovery 5. Auditing , , ^oe E ~` P( oe E Penetration test ~` P( e ֹ <{ n 7 @ ^oe Managing Information Systems Security Responding to a Security Breach CERT( f|E - Ѱ E ) 3V ( 2 - CERT/CC ~ \P( ,, ( S{ ) P ѹ @ E 10% h ݹ , CSD( hoeݪE CSD a IS ~` P( 2 IS \P( Managing Information Systems Security The States of Systems Security Management ~`\P( ݹ ѹ {< @ <p{ {F { ` { (a ,a ) - ... ( P FS{ - 25% ( \P - 20% ~` \ ( @| E - ,, ( FS{ - 90% ( \P - 0 Y`P ~` \P( @| E ...
View Full Document

This note was uploaded on 10/09/2009 for the course UNKNOWN g taught by Professor G during the Spring '09 term at Air Force Institute of Technology, Ohio.

Ask a homework question - tutors are online