Preview

Cis Studyguide

Powerful Essays
Open Document
Open Document
1150 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis Studyguide
Review
Overview of the Info Security (3 MC, 2 S/A, 1LA)
Objectives:
1. Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets 2. Know and understand the definition and key characteristics of information security 3. Know and understand the definition and key characteristics of leadership and management 4. Recognize the characteristics that differentiate information security management from general management
Concepts:

Information security (InfoSec) is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.
Figure 1-1 shows that information security includes the broad areas of information security management (the topic of this book), computer and data security, and network security. At the heart of the study of information security is the concept of policy (discussed in detail in Chapter 4). Policy, awareness, training, education, and technology are vital concepts for the protection of information and for keeping information systems from danger.

* Business Mgmt Professionals: Orgzn ad Info Sec strategy, policy and resources ($$) * I.T. Mgmt : support business objectives w/ appropriate information technology (HW, SW, NW, interfaces) * InfoSec Mgmt: provide technical protective environment for critical assets from threats/ exploits, disruptions
Communities of Interest * InfoSec community: protects the organization’s information assets from the threats they face. * IT community: supports the business objectives of the organization by supplying and supporting information technology appropriate to the business’ needs. * Non-technical general business community: articulates and communicates organizational policy and objectives and allocates resources to the other groups.

Information Technology (I.T.)
= tangible HW, SW, DBs, NW, technologies used to

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 110 Exam 1 Study Guide

    • 3983 Words
    • 16 Pages

    The paragraph mark (¶) as shown in the accompanying figure is a formatting mark that indicates where the _____ was pressed.…

    • 3983 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Information technology is known as "the study, design, development, application, implementation, support or management of computer-based information systems. There are many systems that an organization uses on a daily basis from Management Information Systems (MIS), to Transaction Processing Systems (TPS), to Decision Support Systems (DSS). In today’s society those systems are the vital parts of an organization’s survival. IT systems are the backbone of an organization’s operations and without them organizations fall short of providing services. They drive all of the daily tasks, store files and data, provides solutions to problems, and give competitive advantages.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Mat 540 Quiz

    • 759 Words
    • 4 Pages

    Information technology (IT) consists of all the hardware that a firm needs to use in order to…

    • 759 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    Information Technology (IT) is a set of tools, processes and methodologies (such as coding, programming, data communications, data conversion, storage and retrieval, system analysis and design, systems control) and associated equipment employed to collect, process, and present information. In broad terms, IT also includes office automation, multimedia and telecommunications. It is defined as the technology used involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data. IT is a broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. Because computers are central to information management,…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    CIS510 STUDENT GUIDE

    • 6331 Words
    • 26 Pages

    This course provides an integrated approach to system analysis and design processes. Students will explore advanced topics to evaluate and select system development methodologies and design system solutions. The role of effective interpersonal communication techniques and integration practices with users and user systems is emphasized.…

    • 6331 Words
    • 26 Pages
    Good Essays
  • Powerful Essays

    Information technology benefits a business by allowing it to work more efficiently and effectively to maximise productivity.…

    • 2600 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays