SlideShare une entreprise Scribd logo
1  sur  212
HAPTER 7 Information Systems Controls for Systems Reliability Part 1:  Information Security
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],SECURITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY SYSTEMS RELIABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],This is a contract for . . . Encryption Algorithm Xb&j &m 2 ep0%fg . . . Decryption Algorithm This is a contract for . . . Plaintext Plain- text Cipher- text Key + + Key
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],[object Object],[object Object],[object Object],Digital certificate for USA Public key for USA
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],Digital certificate for N.W. Public key for N.W.
PREVENTIVE CONTROLS N.W. U S A ,[object Object],USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Digital signature Hash of NW Bid NW’s Bid Coded w/ NW private key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],USA Public N.W. Public Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid A-OK
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1

Contenu connexe

Tendances

Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
SAIGlobalAssurance
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
norsaidatul_akmar
 

Tendances (20)

Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Information classification
Information classificationInformation classification
Information classification
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
it grc
it grc it grc
it grc
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Popular Pitfalls In Isms Compliance
Popular Pitfalls In Isms CompliancePopular Pitfalls In Isms Compliance
Popular Pitfalls In Isms Compliance
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
 
Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)
 

Similaire à Ais Romney 2006 Slides 07 Is Control1

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
Prashant Singh
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
ANSAPPARELS
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
MaximaSheffield592
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
healdkathaleen
 

Similaire à Ais Romney 2006 Slides 07 Is Control1 (20)

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdf
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 

Plus de sharing notes123

Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
sharing notes123
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
sharing notes123
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
sharing notes123
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
sharing notes123
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
sharing notes123
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
sharing notes123
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
sharing notes123
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
sharing notes123
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
sharing notes123
 

Plus de sharing notes123 (20)

Uthaya Chap 05 Input
Uthaya Chap 05 InputUthaya Chap 05 Input
Uthaya Chap 05 Input
 
Amr Grp Friendster
Amr Grp FriendsterAmr Grp Friendster
Amr Grp Friendster
 
Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
 
Faizan Chap 07 Storage
Faizan Chap 07 StorageFaizan Chap 07 Storage
Faizan Chap 07 Storage
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
 
Bliana Chap 02 Internet
Bliana Chap 02 InternetBliana Chap 02 Internet
Bliana Chap 02 Internet
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
 
Mahendran Chap 06 Output
Mahendran Chap 06 OutputMahendran Chap 06 Output
Mahendran Chap 06 Output
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Ais Romney 2006 Slides 07 Is Control1

  • 1. HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155. PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
  • 156. PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
  • 197.
  • 198.
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.