Overview of Information Security Management: Chapters 1-5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Information Security (InfoSec)

Protecting information through confidentiality, integrity, and availability.

2
New cards

C.I.A Triad

Confidentiality, Integrity, and Availability in information security.

3
New cards

CNSS Security Model

Three dimensions: people, technology, and operations.

4
New cards

Software Attacks

Malicious actions targeting software vulnerabilities.

5
New cards

Cryptographic Sins

Weak password systems compromising security.

6
New cards

POLC Management Theory

Planning, Organizing, Leading, and Controlling principles.

7
New cards

The Six Ps

Planning, Policy, Programs, Protection, People, Project management.

8
New cards

Ethics

Philosophy of moral judgment and conduct.

9
New cards

Meta-Ethics

Study of the nature of ethical properties.

10
New cards

PC! DSS

Payment Card Industry Data Security Standards compliance.

11
New cards

Digital Forensics

Process of analyzing digital media for evidence.

12
New cards

Stakeholder

Person or organization with vested interest.

13
New cards

IDEAL Model

Governance framework for strategic planning.

14
New cards

CGTF Framework

Defines board and executive responsibilities in governance.

15
New cards

Risk Management

Identifying, assessing, and evaluating organizational risks.

16
New cards

Enterprise Information Security Policy (EISP)

High-level policy governing overall information security.

17
New cards

Issue-Specific Security Policies (ISSP)

Policies addressing specific security issues.

18
New cards

System-Specific Security Policies (SysSP)

Policies tailored for specific systems or applications.

19
New cards

Security Program

Structure to manage risks to information assets.

20
New cards

CISSP Domains

Key areas of knowledge for CISSP certification.

21
New cards

NICE Cybersecurity Framework

Focuses on seven security work domains.

22
New cards

Work Breakdown Structure (WBS)

Decomposing project deliverables into manageable components.

23
New cards

Project Management

Applying skills and techniques to meet project goals.