IA 2 - UNIT 2 Flashcards
different types of assets
- Tangible
- Intangible
Three Controls Assigning Responsibility
- Inventory
- Ownership
- Acceptable Use
Responsibilities of Assets
- provides adequate levels of security
- assigned to identified entities
- risk management and security responsibilities
- provides accountability for asset protection
Organization’s Assets
- Data / Information
- Hardware
- Intangible
- People
- Service
- Software
- Identify and record information about the
assets - Movements and changes are documented and updated
Inventory
- Assets have established owners
- Responsibility of security of assets
- Review of Classification and use authorisation
Ownership
- Develop policies and guidelines
- Similar categories covered under the same policy
- Disclosure and release of information are cited
Acceptable Use
Organising information by sensitivity and loss disclosure, modification and unavailability.
Classification and Handling
Two controls in place
- Classification Guidelines
- Information labeling and handling
- Organised by information needs and impact in case of breach
- Originator is responsible for classifying and protecting information based on policies and procedures
Classification Guidelines
Classification is based on value and impact
determines the level of
- confidentiality
- integrity
- availability
Classification Guidelines Considers
- Security classification
- Information assurance
- Information owners Business,
- Industry, and Legal requirements
- Organisation Culture
Classification Process
- Creation ->
- access control implementation ->
- method of process ->
- information disposal
- Organisations must develop information handling protocols based on the policy on classification
- This preserves information assets
Labeling and Handling
Risk Management Process
- Background Planning
- Asset Analysis
- Threat Analysis
- Vulnerability Analysis
- Risk Identification
- Risk Analysis
- Risk Treatment
Organisations must develop information handling protocols based on the policy on classification This preserves information assets
Labeling and Handling
Background Planning Critical Elements
- Establish the Aim, Scope and Boundary
- Establish the risk evaluation criteria
process of managing the risks involved in Information Technology systems. These include identifying, assessing, and acting on risks to data confidentiality or integrity.
Risk Management
- The measure or the extent of which an entity is threatened by circumstance or event
- The likelihood of a threat event occuring
Risks
Using the CIA Triad
- Confidentiality: What happens if people could see this?
- Integrity: What happens if people could change this?
- Accessibility: What happens if authorized users can’t use this?
- Analyze your assets based on their type (Hardware, Software, People, Services, Platforms)
- Determine their owner, the value and their impact to the organization using the CIA triad
Asset Analysis
conducted while referring to a database of known major threats.
threat analysis
Human threats are divided into three dimensions
- The Motive
- The Opportunity
- The Means
are typically weather-related phenomena.
Natural Threats