SlideShare a Scribd company logo
1 of 39
Chapter 3 Security Policy
Objectives ,[object Object],[object Object],[object Object],[object Object]
Protection of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics: Information Assurance Process   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establishing Information Assurance Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establishing Information Assurance Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy and Information Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy and Information Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy and Information Assurance ,[object Object]
Policy and Information Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relationship: Policy and Assurance Process ,[object Object]
General Requirements for the Information Assurance Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Requirements for the Information Assurance Process ,[object Object]
Developing an Assurance Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Designing a Functional Information Security System ,[object Object],[object Object]
Designing a Functional Information Security System ,[object Object]
Defining the Information Assurance Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining the Information Assurance Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Defining the Information Assurance Boundaries ,[object Object]
Building the Information Assurance Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Building the Information Assurance Boundaries ,[object Object]
Building the Information Assurance Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Building the Information Assurance Boundaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Building the Information Assurance Boundaries ,[object Object],[object Object],[object Object]
Building the Information Assurance Boundaries ,[object Object],[object Object],[object Object]
Maintaining Information Assurance Over Time ,[object Object],[object Object],[object Object]
Handling Expectations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essential Role of Accountability in Maintaining Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communicating Organization and Technical Direction ,[object Object],[object Object],[object Object],[object Object]
Ensuring Organizational Awareness ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enforcing Discipline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Review Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Review Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formal versus Informal Review ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Measuring Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Measuring Performance ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot (19)

Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
E1804012536
E1804012536E1804012536
E1804012536
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Security policy
Security policySecurity policy
Security policy
 
Information security
Information securityInformation security
Information security
 
Testing
TestingTesting
Testing
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Chapter008
Chapter008Chapter008
Chapter008
 
Chapter005
Chapter005Chapter005
Chapter005
 
Breach response
Breach responseBreach response
Breach response
 

Similar to Chapter003

Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfkelyn Technology
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 

Similar to Chapter003 (20)

Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 

More from Jeanie Delos Arcos (20)

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt
 
Chapter006
Chapter006Chapter006
Chapter006
 
Pentium II
Pentium IIPentium II
Pentium II
 
Celeron
CeleronCeleron
Celeron
 
80486
8048680486
80486
 
Pentium 3
Pentium 3Pentium 3
Pentium 3
 
03 Buses
03 Buses03 Buses
03 Buses
 
02 Computer Evolution And Performance
02  Computer  Evolution And  Performance02  Computer  Evolution And  Performance
02 Computer Evolution And Performance
 
07 Input Output
07  Input  Output07  Input  Output
07 Input Output
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
 
08 Operating System Support
08  Operating  System  Support08  Operating  System  Support
08 Operating System Support
 
05 Internal Memory
05  Internal  Memory05  Internal  Memory
05 Internal Memory
 
09 Arithmetic
09  Arithmetic09  Arithmetic
09 Arithmetic
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 
01 Introduction
01 Introduction01 Introduction
01 Introduction
 
ISM424 RM
ISM424 RMISM424 RM
ISM424 RM
 
Henz new
Henz newHenz new
Henz new
 
Honey
HoneyHoney
Honey
 
Taralets
TaraletsTaralets
Taralets
 

Chapter003

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.