What are the different parts of the security triangle?
What are some reasons why systems are vulnerable?
Why is the internet vulnerable?
What are some security threats?
Who can be an internal threat?
Employees
Why can employees be an internal threat?
Why can software be vulnerable?
What are some other security threats?
What are some flaws in commercial software?
What are patches?
* Patch management
What is the Business Value of Security and Control?
Why are firms now more vulnerable than ever?
Because of..
• Confidential personal and financial data.
• Trade secrets, new products, strategies.
What are some Legal and Regulatory Requirements for Electronic Records Management?
What is HIPAA?
Medical security, privacy rules and procedures.
What is the Gramm-Leach-Bliley Act?
Requires financial institutions to ensure the security and confidentiality of customer data.
What is the Sarbanes-Oxley Act?
Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.
What is Electronic Evidence?
* Proper control of data can save time and money when responding to legal discovery request.
What is Computer Forensics?
What are some Information Systems Controls
What are Physical Controls?
* Fences around buildings, lock
What are Administrative Controls?
Concerned with humans.
• Backup checks
• Policies
• Security awareness training
What are Technical Controls?
Implementing the security policies.
• An access control list at a gateway or firewall
• Access controls inside a database
What is Risk Assessment?
What is disaster recovery planning?
Devises plans for restoration of disrupted services.