Читайте также:
|
|
самое уязвимое место, исследовать следующее, управление активами, человеческие ресурсы, экологическая безопасность, управление доступом, приобретение и обслуживание, управление непрерывностью бизнеса, соответствие установленным требованиям, оценка ценности, аппаратные средства и программное обеспечение, оценка угроз, злонамеренные действия, оценка уязвимости, вычисление влияния, обеспечить пропорциональный ответ, без видимой потери производительности, относительная низкая частота возникновения, уменьшить риск, выбрать подходящие меры, купить страховку, ставить под сомнение реальность риска, отрицать существование риска
Keys
Ex. VI
1 – a
2 – k
3 – h
4 – n
5 – b
6 – j
7 – g
8 – q
9 – i
10 – o
11 – d
12 – l
13 – m
14 – f
15 – p
16 – c
17 – e
Ex. X
1 – l
2 – e
3 – d
4 – b
5 – g
6 – a
7 – k
8 – c
9 – f
10 – i
11 – h
12 – j
Ex. XI
1 – e
2 – b
3 – f
4 – a
5 – c
6 – d
7 – h
8 – g
9 – i
UNIT 7 – CONTROLS
When Management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls.
Administrative
Administrative controls (also called procedural controls) consist of approved written policies, procedures, standards and guidelines. Administrative controls form the framework for running the business and managing people. They inform people on how the business is to be run and how day to day operations are to be conducted. Laws and regulations created by government bodies are also a type of administrative controls because they inform the business. Some industry sectors have policies, procedures, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies.
Administrative controls form the basis for the selection and implementation of logical and physical controls. Logical and physical controls are manifestations of administrative controls. Administrative controls are of paramount importance.
Logical
Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls.
An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees’ job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required by their new duties are frequently added onto their already existing access privileges which may no longer be necessary or appropriate.
Physical
Physical controls monitor and control the environment of the work place and computing facilities. They also monitor and control access to and from such facilities. For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades, fencing, security guards, cable locks, etc. Separating the network and work place into functional areas are also physical controls.
An important physical control that is frequently overlooked is the separation of duties. Separation of duties ensures that an individual can not complete a critical task by himself. For example: an employee who submits a request for reimbursement should not also be able to authorize payment or print the check. An applications programmer should not also be the server administrator or the database administrator - these roles and responsibilities must be separated from one another.
Дата добавления: 2015-09-10; просмотров: 86 | Поможем написать вашу работу | Нарушение авторских прав |
|