Preview

Information Assurance Professional V1

Powerful Essays
Open Document
Open Document
6871 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Assurance Professional V1
Information Assurance
Professional

National Security Registration
Board
Version 2.6

Course Goals
• This presents the fundamental concepts of information assurance.
• It is designed to foster a mastery level understanding of the IA process.
• The intention is to prepare a trained IA professional Course Application
• You learn how to tailor a practical information assurance architecture using this BOK.
• As well as how to deploy an appropriate set of flexible countermeasures.

Three Assumptions


Three major assumptions underlie this course: •

Assumption One
– Effective Information security requires an integrated set of business and technological processes.

The Three Assumption


Assumption Two



Effective information security programs must be deliberately designed and deployed organization-wide through a strategic planning process

The Three Assumption


Assumption Three



Information security programs are systematic, •

That is, they embody an appropriate set of persistent and interacting controls



These function seamlessly and as an integral element of day-to-day operation of the business

The Importance of Planning


All three of these requirements must be satisfied for the solution to be correct. •

That condition is not arrived at by chance. •

It is always derived from a valid set of common best practices.

The IBOK


The IBOK is a compendium, or body-ofknowledge rather than a standard



It is an integration of three existing models into a single unified concept



The idea is that, a harmonized set of recommendations is the most authoritative statement about best practice.

Best Practice Models


There are at least three models that are used to guide that process,


The Generally Accepted System Security
Principles (GASSP), 1999



ISO 17799 and BS 7799:2 (2002)



COBIT (2006)

Best Practice Models


Each of these embodies a fundamental set of principles derived from extensive
“lessons learned”



Each of these provides

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The management information system helps the managers with reports by giving them access to the organisations Management information systems MIS: are the computer systems in an enterprise that provides information about its business operations. The management information system is the centrally coordinated system of a computer expertise and management, The MIS is the computerized database of financial information organizes and programed to produce regular reports on operations. At ICT4Students we use MIS to give feedback on our performance and are used to monitor the company as a whole oppose to separate departments so we can check the product sale levels and the rate of refurbishment of products. The MIS helps us to measure our progress to reach our goals.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan.…

    • 313 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many threats to an organization, these include internal and external; virtual and physical threats. All of which can be tackled in some manner. Some are easier address then others.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    1.7 Store and retrieve presentation files effectively, in line with local guidelines and conventions where available…

    • 1708 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Information Security Ppt

    • 1127 Words
    • 5 Pages

    COEN 166/266 Overview AgentWorld is a simulated natural environment, populated with competing agents, vegetation, and predators. Agents can consume vegetation (when it is blooming) to increase their energy level. An agent’s energy level will also decrease over time based on their activity. Invocation When the “simworld” executable is run, each of the environments in the Environments directory will be run in succession. Each time that an environment simulation is run, it is populated with all agents from the Agents directory. When a simulation is complete, a history of the simulation is added to the Results directory. Environment The environment is comprised of an unknown-sized grid, with each square containing no more than one of the following items at any time: * Student Agent: Yourself, or another student * Vegetation: The resources your agent will eat to increase its energy level * Predator Agent: An environmentally-controlled agent that wanders the terrain looking for Student Agents to attack. * Boundaries: The edge of the landscape. The following attributes are specified in the environment file: * Size of the world (X and Y dimensions) * Duration of the simulation, in turns * Starting energy level of the agents * For each type of vegetation: - The likelihood of it occurring in a given square - The incubation period (number of turns after it is eaten before it will bloom again) - The bloom patten (how much energy it will be worth after each turn in which it is in bloom) * For each type of predator: - How much damage it can inflict on an agent (in terms of energy lost) - How many turns the predator will survive - How many instances of the predator will be in the environment at any given time Actuators Your agent will be able to perform one of the following actions: STAY: Your agent’s position and orientation will not change. It will, however, lose 1 point of energy. TURN-{RIGHT,LEFT,AROUND}: Your agent’s orientation will change to the (relative)…

    • 1127 Words
    • 5 Pages
    Good Essays