System has been approved to meet the security requirements of the data owner
Certification
Data owner’s acceptance of the certification and of the residual risk
Accreditation
Risk Management framework from Carnegie Mellon University
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
What’s the three phase process for managing risk according to OCTAVE?
Phase 1 - Identify staff knowledge, assets, and threats
Phase 2 - Identify vulnerabilities and evaluate safeguards
Phase 3 - Conduct the risk analysis and develop the risk mitigation strategy
International Common Criteria
- International Common Criteria term
Target of Evaluation (ToE)
Security target
Protection Profile
- International Common Criteria term
Evaluation Assurance Level (EAL)
- International Common Criteria Evaluation Assurance Level (EAL)
EAL1
- International Common Criteria Evaluation Assurance Level (EAL)
EAL2
- International Common Criteria Evaluation Assurance Level (EAL)
EAL3
- International Common Criteria Evaluation Assurance Level (EAL)
EAL4
- International Common Criteria Evaluation Assurance Level (EAL)
EAL5
- International Common Criteria Evaluation Assurance Level (EAL)
EAL6
- International Common Criteria Evaluation Assurance Level (EAL)
EAL7
Control framework for employing security governance best practices within an organization
COBIT
What are the four COBIT domains?
Framework for providing the best service in IT service management
Information Technology Infrastructure Library (ITIL)
What are the five ITIL Service Management Practices?
Process of determining which ports of a standard will be employed by an organization
Scoping
Process of customizing a standard for an organization
Tailoring
Data at Rest
- Best protection end-to-end encryption
Data in Transit