Technology Brief Information Security Overview Information security ensures the confidentiality, integrity, & availability. An organization without security policies & appropriate security rules are at great risk, & the confidential information & data related to that organization are not secure in the absence of these security policies. An organization along well-defined security policies & procedures helps in protecting the assets of that organization from unauthorized access & disclosures. Essential Terminologies HACK VALUE – This is a value that denotes attractiveness, interest or something that is worthy. ZERO-DAY ATTACK – This refers to threats & vulnerabilities that can exploit the victim before the developer identify or address & release patch for that vulnerability. VULNERABILITY – IT refers to a week point, loophole or a cause in any system, software, or network which can be helpful & utilized by the attackers to go t...
CERTIFIED INFORMATION SECURITY MANAGER (CISM) CERTIFICATION TRAINING DOMAIN ONE: INFORMATION SECURITY GOVERNANCE LESSON ONE: PART ONE DOMAIN DEFINITION Establish &/or maintain an information security governance framework & supporting processes to ensure that the information security strategy is aligned with organization goals & objectives. LEARNING OBJECTIVES · Understand the purpose of information security governance, what it consists of & how to accomplish it · Understand the purpose of an information security strategy, its objectives, & the reasons & steps required to develop one · Understand the meaning, content, creation & use of policies. Standards, procedures & guidelines & how they relate to each other · Develop business cases & gain commitment from ...