欢迎来到天天文库
浏览记录
ID:43286614
大小:712.50 KB
页数:36页
时间:2019-10-08
《[澳大利亚TAFE课程][信息安全管理]InfoSecCh01new》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、ManagementofInformationSecurityChapter1:IntroductiontotheManagementofInformationSecurityIfthisistheinformationsuperhighway,it’sgoingthroughalotofbad,badneighborhoods.--DORIANBERGER,1997IntroductionInformationtechnologyiscriticaltobusinessandsocietyComputersecurityisevolvingintoinfor
2、mationsecurityInformationsecurityistheresponsibilityofeverymemberofanorganization,butmanagersplayacriticalrole2ManagementofInformationSecurityIntroductionInformationsecurityinvolvesthreedistinctcommunitiesofinterest:InformationsecuritymanagersandprofessionalsInformationtechnologymana
3、gersandprofessionalsNon-technicalbusinessmanagersandprofessionals3ManagementofInformationSecurityCommunitiesofInterestInfoSeccommunity:protectinformationassetsfromthreatsITcommunity:supportbusinessobjectivesbysupplyingappropriateinformationtechnologyBusinesscommunity:articulatesorgan
4、izationalpolicyandallocatesresources4ManagementofInformationSecurityWhatIsSecurity?“Thequalityorstateofbeingsecure—tobefreefromdanger”Securityisachievedusingseveralstrategiessimultaneously5ManagementofInformationSecuritySpecializedAreasofSecurityPhysicalsecurityPersonalsecurityOperat
5、ionssecurityCommunicationssecurityNetworksecurityEachcontributestotheinformationsecurityprogramasawhole6ManagementofInformationSecurityInformationSecurityInfoSecistheprotectionofinformationanditscriticalelements,includingthesystemsandhardwarethatuse,store,andtransmitthatinformationIn
6、foSecincludesinformationsecuritymanagement,computersecurity,datasecurity,andnetworksecurityPolicyiscentraltoallinformationsecurityefforts7ManagementofInformationSecurityFIGURE1-1ComponentsofInformationSecurity8ManagementofInformationSecurityCIATriangleTheC.I.A.triangleismadeupof:Con
7、fidentialityIntegrityAvailabilityOvertimethelistofcharacteristicshasexpanded,butthesethreeremaincentral9ManagementofInformationSecurityFigure1-2NSTISSCSecurityModelThe3communitiesofinterestmustaddressall27componentswhendesigningorreviewinganinformationsecurityprogram.Example:Addresst
8、heuseofpolic
此文档下载收益归作者所有