Security Risk Management
We as security professionals need to reduce risk, mitigate liability, ensure business continuity, reduce operating costs, comply with government and insurance regulations and future-proof your business. Security management is a broad topic which includes risk management, information security policies, procedures, standards, guidelines, baselines and security education. The objective of security program is to protect organization and its assets. Management tools such as information classification, risk assessment and risk analysis are used to identify threats, classify assets and to rate system vulnerabilities so that effective control can be implemented.
Organizational Security Model or Framework
Organizational security model is a framework which is made of many components (logical, physical and administrative), procedures, processes and configurations that all work together to provide security level for the given system.
Information security or InfoSec
Infosec as it is known popularly is the term used to define the practice to protect the information from illegal access, use, disclosure, disruption, change, perusal, inspection, recording or destruction. This is a standard term that is used regardless of the form the data may take.
The following are the typical terms that we will hear when dealing with information security:
IT Security or Computer Security
IT Security, also known as Computer Security is defined as information security when applied to technology (Hardware and Software). We define a computer as any device or hardware with a processor and memory. IT security specialists are present in almost all major enterprise/ establishments due to the nature and value of the data within larger businesses. The IT security team is responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.
Information Assurance (IA) is the act of ensuring that data is not lost when grave issues arise. The issues which can be reason for loss of data can include but are not limited to the natural disasters, computer problem or error, physical theft of the hardware or software, or any other issue where data has the potential of being lost. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of the application and user data. It uses physical, technical and administrative controls to accomplish these tasks. While focused predominantly on information in digital form, the full range of IA encompasses not only digital but also analog or physical form. These protections apply to data in transit, both physical and electronic forms as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security.
Certified Information Systems Auditor (CISA)
CISA certification is meant for Information Technology professionals specifically in audit arena sponsored by ISACA, formerly the Information Systems Audit and Control Association. This particular certification is planned for those who audit, control, monitor and review an enterprise’s information technology and business systems. Candidates for the certification must meet requirements set by ISACA on educational qualification and professional experience.
Security policy is the term used to describe as what it means to be a secure system, organization or component or entity. This policy addresses the constraints on actions taken by its members as well as constraints imposed on adversaries. Security policy for the given systems is the mechanism to address constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.
IT Security Incident Management
IT Security Incident Management can be defined as a process which tells us on the effectiveness of preparation by our information technology (IT) department or administrator to handle security incidents. In our experience many organizations will only learn to respond to security incidents after suffering attacks. After attack, incidents often become much more costly than needed. Proper incident response should be an integral part of the organization's overall security policy and risk mitigation strategy.
Network security is the term often used for the requirements and policies adopted by a network team to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network service or resource.
Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned a Used ID and password or it could be any other information to authenticate and access to information and programs they are authorized to access. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
Happy learning! We wish you good luck in your "CISA Certification Program" journey.
Find our CISA®- Certified Information Systems Auditor Online Classroom training classes in top cities:
|CISA®- Certified Information Systems Auditor||19 Jan -10 Feb 2019, Weekend batch||Your City||View Details|
|CISA®- Certified Information Systems Auditor||16 Mar -7 Apr 2019, Weekend batch||Seattle||View Details|
Recommended articles for you
Reassessing the Concepts of Security Risk ManagementArticle
Top 8 Vulnerable Cyber Security Risks in the todays era of D...Article
Elementary Conceptions of Data Security and ProtectionArticle