1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
implementation phase
The ? of information security involves putting plans into action to protect an organization’s information assets.
Project Plan
To successfully implement information security, organizations must create a comprehensive __________ that outlines the required security controls and how to implement them.
procedures
people
hardware
software
data
The project plan should address
Identifying Objectives
Resource Allocation
Task Breakdown
Scheduling
Risk Management
Key steps in project plan include:
Identifying Objectives
Clearly define the goals of the security project.
Resource Allocation:
Determine the resources (human, technical, and financial) needed.
Task Breakdown
Divide the project into smaller, manageable tasks.
Scheduling
Set timelines for each task to ensure timely implementation.
Risk Management
Identify potential risks and prepare mitigation strategies.
Project Planning Considerations
Organizations must address various considerations when developing a project plan, including scope, time, cost, and quality. It’s essential to ensure that the security project aligns with business goals and does not hinder operations.
Scope Considerations
Scope defines the boundaries of the security project. A well-defined scope helps avoid scope creep, which can derail the project by introducing unforeseen tasks.
Set clear deliverables.
Identify dependencies and constraints.
Engage stakeholders to clarify expectations.
Project managers must:
Overseeing project execution.
Coordinating between teams.
Managing resources and timelines.
Resolving issues as they arise.
A dedicated project manager plays a crucial role in:
Project management
ensures that the information security project remains on track and achieves its objectives.
Phased Implementation
Pilot Implementation
Parallel Operations
Conversion Strategies
Organizations can use different strategies to implement security systems:
Phased Implementation
Roll out the new system gradually across departments.
Pilot Implementation
Test the system in a single department before a full rollout.
Parallel Operations
Run the new system alongside the old one to ensure stability.
Bull’s-Eye Model
The ?? prioritizes security efforts by focusing on four layers
Policies
Networks
Systems
Applications:
Bull’s-Eye Model layers:
Policies
Establishing rules and guidelines.
Networks
Securing communication channels.
Systems
Protecting individual devices and servers.
Applications
Safeguarding software used by the organization.
Outsourcing
Organizations must decide whether to handle security internally or outsource it to
third-party providers. ?? can bring expertise but also risks, such as loss of control
over sensitive data.
Technology governance
?? ensures that the organization’s technology use aligns with business goals. Change control processes help manage modifications to systems, ensuring that changes do not introduce vulnerabilities.
Non Technical Aspects of Implementation
● Communicate: Clearly explain the benefits of the changes.
● Involve: Engage employees in the implementation process.
● Train: Provide training to ensure employees understand new policies and technologies.
Establishing a security-aware culture.
Ensuring compliance with new policies.
Managing resistance to change.
Organizations must address the human factor in information security. This includes:
Certification
The process of evaluating a system’s security controls to ensure they meet predefined standards.
Accreditation
The formal approval for the system to operate, granted by a senior official.
National Institute of Standards and Technology (NIST)
The ??? provides a framework for applying the Risk Management Framework (RMF) to federal information systems.
1. Categorize the information system.
2. Select security controls.
3. Implement security controls.
4. Assess security controls.
5. Authorize information system operation.
6. Monitor security controls continuously.
The Risk Management Framework (RMF) includes six steps:
NSTISSI-1000: National Information Assurance Certification and Accreditation Process (NIACAP)
outlines the processes required to certify and accredit information systems within
the U.S. Department of Defense (DoD).
ISO 27001/27002 Systems Certification and Accreditation
are international standards for managing information security. The certification process includes:
1. Developing and implementing an Information Security Management System
(ISMS).
2. Undergoing audits by accredited certification bodies.
3. Maintaining the certification through regular surveillance audits.