chapter02 terms

chapter02 terms - Methodology Mission statement Operational...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Management of Information Security 2-1 Chapter 2 Key Terms Analysis phase Attack Bottom-up approach Business continuity planning (BCP) Champion Chief Information Officer (CIO) Chief Information Security Officer (CISO) Contingency planning (CP) Control Data custodians Data owners Data users Disaster recovery planning (DRP) Ethical hackers Event-driven Exploit Feasibility analysis Implementation phase Incident response planning (IRP) Information security policy Investigation phase Joint Application Development (JAD) Logical design phase Maintenance phase Managerial controls
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Methodology Mission statement Operational controls Penetration testing Physical design phase Physical security Plan-driven Red teams Risk analysis Risk assessment Risk management Safeguard Security education, training, and awareness (SETA) Security Managers Security systems development life cycle (SecSDLC) Security technicians Strategy Structured review Systems development life cycle (SDLC) Technical controls Threat Threat agent Tiger teams Top-down approach Values statement Vision statement Vulnerability White-hat hackers Principles of Information Security 1-2...
View Full Document

Page1 / 2

chapter02 terms - Methodology Mission statement Operational...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online