IAS - APPROACHES TO INFORMATION . . Flashcards

Lesson 2

1
Q

A method of establishing security policies and/or practices that begins as a grassroots in system administrator attempt to improve the security of their systems.

Employee Input
Company Wide Collaboration
Tasks Completed and Sent to higher ups

A

BOTTOM-UP APPROACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A methodology of establishing security policies and/or practices that is initiated by upper management.

Jobs are Altered and Completed Based on Higher Authority
Employees receive specific tasks
Tasks Delegated by Upper management

A

TOP-DOWN APPROACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SECURITY IN THE SYSTEMS DEVELOPMENT LIFE CYCLE

an SDLC is a methodology for the design and implementation of an information system.

Using a methodology ensures a rigorous process with clearly defined goal and increases the probability of success.

A

SYSTEM DEVELOPMENT LIFE CYCLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of SDLC in which each phrase of the process “flows from” the information gained in the previous phase, with multiple opportunities to return to previous phase, . .

A

Waterfall Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Waterfall Methodology Phases
(I, A, L , P , I ,M)

A
  • Investigation
  • Analysis
  • Logical Design
  • Physical Design
  • Implementation
  • Maintenance and Change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Begins by examining the event or plan that initiates the process

During this phase, the objectives constraints, . . .

A

INVESTIGATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This phase consists primarily of assessment of the organization, its current systems, and its capability to support the proposed systems

A

ANALYSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Begin in creating a streams solution for a business problem. In any system solution, the driving factor must be the business need.

A

LOGICAL DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Specific technologies are selected to support the alternatives identified and evaluated in the logical design.

A

PHYSICAL DESIGN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

**Any needed software is created.
**
Components are ordered, received and tested/ afterwards.

A

IMPLEMENTATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Longest and most expensive of the process.

This phase consists of the task necessary to support and modify the system for the remainder of its useful life cycle.

A

MAINTENANCE AND CHANGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SECURITY PROFESSIONALS AND THE ORGANIZATION

An executive-level position that oversees the organizations computing technology and strives to create efficiency in the processing

SENIOR MANAGEMENT

A

Chief Information Officer (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Top information security officer in an organization.

SENIOR MANAGEMENT

A

Chief Information Security Officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

INFORMATION SECURITY PROJECT TEAM

Promotes the project and ensure its support.

A

Champion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Understand project management, personnel management, and information security technical requirements.

A

Team Leader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Understand the organization culture, existing policies, and requirements for developing and implementing successful policies.

A

Security Policy Developers

16
Q

Understand financial risk assessment techniques

A

Risk Assessment Specialist

17
Q

DATA OWNERSHIP

Control and responsible for the security and use of a particular set of information.

A

Data Owners

17
Q

Responsible for storage maintenance and protection of information.

A

Data Custodians

18
Q

Internal and external stakeholder who interact with information in support of their organizing planning and organization.

A

Data Users