Security Mgt U8, Information Assurance

jjanesko
Mind Map by , created over 6 years ago

IYM001 Mind Map on Security Mgt U8, Information Assurance, created by jjanesko on 04/14/2013.

89
20
0
Tags
jjanesko
Created by jjanesko over 6 years ago
Security Mgt U8, Incident Recovery Image
jjanesko
Security Mgt U5, risk analysis and mgt (part 1)
jjanesko
Security Mgt: Legislation, Organizations, Standards
jjanesko
10 Study Techniques
PatrickNoonan
A-level Sociology Quiz
Chuck Amobi
Security Mgt, ISO 27001, PDCA
jjanesko
Security Mgt U3, BS7799 (Part 1)
jjanesko
Security Mgt, Flashcards for ISO 27000 series
jjanesko
Exemplary Assignment Answers
jjanesko
Security Mgt U5, quantitative risk assessment forumula (image)
jjanesko
Security Mgt U8, Information Assurance
1 information assurance concerned with
1.1 confidentiality
1.2 integrity
1.3 availability
1.4 legality
2 business continuity planning (BCP)
2.1 Tested plans and procedures built into the normal operations processes which allow a business to protect itself against threats
2.1.1 includes
2.1.1.1 damage limitation
2.1.1.2 recovery
2.1.1.3 emergency response
2.1.1.4 crisis management
2.1.1.5 monitoring
2.1.1.6 mitigation
2.1.1.7 acceptance of residual risk
2.1.2 stakeholders
2.1.2.1 employees
2.1.2.2 bankers
2.1.2.3 suppliers
2.1.2.4 regulators
2.1.2.5 finance
2.1.2.6 competitors
2.1.2.7 shareholders
2.1.3 goal
2.1.3.1 recovery reducing the impact from untoward events
2.1.4 things to identify during planning (see attached chart)

Attachments:

2.1.4.1 what is "normal" output
2.1.4.2 minimum acceptable output level for business
2.1.4.3 how long it will take to get back to full production
2.1.4.4 steps for replacement and repair
2.1.4.5 resumption time
2.1.4.5.1 this is the time from the incident to the achieving minimal acceptable output level
2.2 NOT a technical issue
2.2.1 board level accountability
2.2.2 ownership by business and operations
2.2.3 stress test based
2.3 NOT disaster recovery planning
2.3.1 DRP focuses on technology (limited scope) whereas BCP focuses on business processes
3 legislation, standards and organizations that provide guidance
3.1 Nimda
3.2 Code Red
3.3 SANS
3.4 Turnbull compliance
3.5 Basel 2
3.6 ISO 17799
4 why?
4.1 minimize incident impact on org & recover from loss of information assets to an acceptable level through a combo of preventative and recovery controls

Media attachments