Zusammenfassung der Ressource
Informatic security
- objectives
- Work strategy
- Precludes access to private service information
- Decrease risk
- Requires verification of the applicant's information
- Protection of infrastructure
- What protects?
- Files
- Software
- Data
- Methods
- Framework
- Tool to support the construction and execution of software
- COBIT
- domain
- Planification and organization
- Acquisition
- Delivery
- Monitoring
- User
- IT Managers
- Managerial
- End Users
- Auditors
- Levels of security
- Maturity Model
- Indicators of performance
- Critical factors of success
- Characteristics
- Objective control
- Directed by measurements
- Process Oriented
- Business Oriented
- Based on Controls
- characteristics
- Confidentiality
- Use of cryptology
- Authentication
- User verification
- I do not repudiate
- Message denied
- integrity
- Adulterated message