Студопедия  
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

XI. Give English equivalents

Читайте также:
  1. An English restaurant
  2. At our department we study different subjects, among them English, economics, marketing, management, accounting, computer technologies, psychology, etc.
  3. BRITISH AND AMERICAN ENGLISH
  4. C) Give English equivalents of the following words and phrases.
  5. C) Give English equivalents of the following words and phrases.
  6. C) Give English equivalents of the following words and phrases.
  7. CAN, MAY, MUST and their equivalents
  8. Check your auditory memory by giving the English equivalents for the following Russian sentences.
  9. Customs and traditions of an English-speaking country
  10. D. Translate into English.

необходимо гарантировать, подлинные данные, удостовериться, обе стороны, подлинность и неотказуемость, подразумевает намерения, выполнять обязательства, не может отрицать отправление информации, цифровые подписи и шифрование, установить подлинность, всестороннее рассмотрение, управление рисками, определение слабых мест, угроза информационным ресурсам, контрмеры, если таковые имеются, уменьшить риск до допустимого уровня, постоянно продолжающийся процесс, деловая среда, появляются каждый день, ценность информационного актива, нанести вред, подвергать опасности, иметь влияние, утраченный доход, потеря имущества, устранить все риски, остаточный риск, оценка риска осуществляется, качественный и количественный анализ

Keys

Ex. IX


1 – e

2 – n

3 – j

4 – m

5 – c

6 – k

7 – b

8 – d

9 – i

10 – g

11 – h

12 – f

13 – l

14 – a


Ex. X


1 – d

2 – f

3 – i

4 – l

5 – g

6 – b

7 – h

8 – e

9 – j

10 – c

11 – a

12 – k


UNIT 6 – INFORMATION SECURITY MANAGEMENT

The research has shown that the most vulnerable point in most information systems is the human user, operator, designer, or other human. The ISO/IEC 27002:2005 Code of practice for information security management recommends the following be examined during a risk assessment:

• security policy,

• organization of information security,

• asset management,

• human resources security,

• physical and environmental security,

• communications and operations management,

• access control,

• information systems acquisition, development and maintenance,

• information security incident management,

• business continuity management, and

• regulatory compliance.

In broad terms the risk management process consists of:

1. Identification of assets and estimating their value. Include: people, buildings, hardware, software, data (electronic, print, others), supplies.

2. Conduct a threat assessment. Include: Acts of nature, acts of war, accidents, malicious acts originating from inside or outside the organization.

3. Conduct a vulnerability assessment, and for each vulnerability calculate the probability that, it will be exploited. Evaluate policies, procedures, standards, training, physical security, quality control, technical security.

4. Calculate the impact that each threat would have on each asset. Use qualitative analysis or quantitative analysis.

5. Identify, select and implement appropriate controls. Provide a proportional response. Consider productivity, cost effectiveness, and value of the asset.

6. Evaluate the effectiveness of the control measures. Ensure that controls provide the required cost effective protection without discernible loss of productivity.

For any given risk, Executive Management can choose to accept the risk based upon the relative low value of the asset, the relative low frequency of occurrence, and the relative low impact on the business. Or, leadership may choose to mitigate the risk by selecting and implementing appropriate control measures to reduce the risk. In some cases, the risk can be transferred to another business by buying insurance or out-sourcing to another business. The reality of some risks may be disputed. In such cases leadership may choose to deny the risk. This is itself a potential risk.

 




Дата добавления: 2015-09-10; просмотров: 22 | Поможем написать вашу работу | Нарушение авторских прав

V. Give Russian equivalents | X. Insert the proper words (see the words below) | Vocabulary | Ex. VIII | Vocabulary | Vocabulary | XII. Give English equivalents | IX. Say in one word (see the words below) | Exercises | VII. Insert the proper words (see the words below) |


lektsii.net - Лекции.Нет - 2014-2024 год. (0.008 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав