Introduction to IT Security Management

0.0(0)
studied byStudied by 3 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering key terms and definitions from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

IT Security Management (ITSM)

Monitoring and administering an organization's IT systems to secure information and data, aiming to ensure confidentiality, integrity, and availability.

2
New cards

CIA

Confidentiality, Integrity, and Availability—the core security properties protecting information and IT services.

3
New cards

IT Management

Management of hardware, networks, and software to meet business requirements, budgets, security, and service delivery.

4
New cards

On-premises, Cloud, and Hybrid IT

Deployment models: on-premises (in-house), cloud (external), or hybrid (a mix).

5
New cards

CIO

Chief Information Officer; senior leader setting IT strategy and overseeing implementation.

6
New cards

CISO

Chief Information Security Officer; senior leader focusing on information, cyber, and technology security.

7
New cards

Security Administrator

Person responsible for day-to-day management of security technology and systems.

8
New cards

Cloud Security Manager

Role focusing on security management of cloud-based infrastructure.

9
New cards

Threat Intelligence Manager

Role focusing on proactive identification and mitigation of cyber threats.

10
New cards

Cybersecurity

The study, protection, and prevention of computer systems from adversaries; involving a wide range of devices and networks.

11
New cards

Data Breaches (2019 data)

In the first nine months of 2019, 7.9 billion records were exposed by data breaches.

12
New cards

Scale of Cyber Threats—Financial Sector

Disruptive and destructive attacks have increased; responsibility for protection is unclear, but resources exist to implement solutions.

13
New cards

Cybersecurity Culture

The knowledge, beliefs, attitudes, norms, and values about cybersecurity and how they influence behavior with information technologies.
How they think and act in cybersecurity.

14
New cards

Organizational determinants of culture

Leadership, clear policies, regular training, updated technology, accountability, and open communication that support secure practices.

15
New cards

Individual determinants of culture

Awareness, responsibility, ethics, knowledge, positive attitudes, and good habits of individuals that contribute to cybersecurity.

16
New cards

Need for CSC

Most data breaches result from human factors; cybersecurity culture aims to embed a secure mindset in the organization.

17
New cards

Organizational Cybersecurity Culture (OCC)

A model examining how organizational culture, national culture, and information security culture interact in cybersecurity.

18
New cards

Organizational Culture Types

Four orientations:
support (focus on people/relationships),
innovation (Encourage creativity/risk-taking),
rules (Emphasizes stability/procedures),
and goal (results-driven).

19
New cards

Hofstede's National Culture Dimensions

Cross-cultural framework on how national culture affects compliance with rules and policies (dimensions include individualism-collectivism, long-term vs short-term, indulgence vs restraint).

20
New cards

Individualism VS Collectivism

Individualism- Prioritizing personal goals, independence, and self-interest.

Collectivism -Valuing group harmony, loyalty, and shared responsibility.

21
New cards

Long-term VS Short-term Orientation

Long-term- Focus on future rewards, perseverance, and tradition.

Short-term- Want quick results and respect for tradition.

22
New cards

Indulgence VS Restraint

Indulgence- Societies allowing free gratification of desires and leisure.

Restraint societies regulate needs through strict norms and self-control.

23
New cards

Information Culture

Attitudes, beliefs, values, and knowledge are used to interact with information systems; behavior results in incidents and evolves.

24
New cards

Building a CSC

Culture extends beyond awareness to include the shaping of beliefs, norms, and values.

A similar goal can be said for cybersecurity: every employee must act in policy ways that keep the organization’s cybersecurity.


25
New cards

IT environment

Consists of a multitude of hardware, network, and software components.

26
New cards

IT infrastructure

Can be on premises, in the cloud, or on a hybrid platform that integrates both.

27
New cards

IT Security Management Roles and Positions

The Chief Information Officer (CIO)

Security Administrator

Emerging Positions

-Cloud Security Manager

-Threat Intelligence Manager

28
New cards

CIO vs CISO

CIOs’ jobs are generalists

CISOs' jobs are more focused on security