chapter02 terms

chapter02 terms - Operational controls Penetration testing...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Management of Information Security 2-1 Chapter 2 Key Terms Analysis phase Attack Bottom-up approach Business continuity planning (BCP) Champion Chief Information Officer (CIO) Chief Information Security Officer (CISO) Contingency planning (CP) Control Data custodians Data owners Data users Disaster recovery planning (DRP) Ethical hackers Event-driven Exploit Feasibility analysis Implementation phase Incident response planning (IRP) Information security policy Investigation phase Joint Application Development (JAD) Logical design phase Maintenance phase Managerial controls Methodology Mission statement
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Operational controls Penetration testing Physical design phase Physical security Plan-driven Red teams Risk analysis Risk assessment Risk management Safeguard Security education, training, and awareness (SETA) Security Managers Security systems development life cycle (SecSDLC) Security technicians Strategy Structured review Systems development life cycle (SDLC) Technical controls Threat Threat agent Tiger teams Top-down approach Values statement Vision statement Vulnerability White-hat hackers Principles of Information Security 1-2...
View Full Document

This note was uploaded on 08/27/2010 for the course IS 2820 taught by Professor Jameskoshi during the Spring '10 term at Webber.

Page1 / 2

chapter02 terms - Operational controls Penetration testing...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online