Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
4Activity

Table Of Contents

INTRODUCTION
OVERVIEW
COORDINATION WITH GLBA SECTION 501(B)
SECURITY OBJECTIVES
REGULATORY GUIDANCE, RESOURCES, AND STANDARDS
SECURITY PROCESS
GOVERNANCE
MANAGEMENT STRUCTURE
RESPONSIBILITY AND ACCOUNTABILITY
INFORMATION SECURITY RISK ASSESSMENT
KEY STEPS
GATHER NECESSARY INFORMATION
IDENTIFICATION OF INFORMATION AND INFORMATION SYSTEMS
ANALYZE THE INFORMATION
ASSIGN RISK RATINGS
KEY RISK ASSESSMENT PRACTICES
INFORMATION SECURITY STRATEGY
KEY CONCEPTS
ARCHITECTURE CONSIDERATIONS
POLICIES AND PROCEDURES
TECHNOLOGY DESIGN
OUTSOURCED SECURITY SERVICES
SECURITY CONTROLS IMPLEMENTATION
ACCESS CONTROL
ACCESS RIGHTS ADMINISTRATION
AUTHENTICATION
NETWORK ACCESS
OPERATING SYSTEM ACCESS
APPLICATION ACCESS
REMOTE ACCESS
PHYSICAL AND ENVIRONMENTAL PROTECTION
DATA CENTER SECURITY
CABINET AND VAULT SECURITY
PHYSICAL SECURITY IN DISTRIBUTED IT ENVIRONMENTS
ENCRYPTION
HOW ENCRYPTION WORKS
ENCRYPTION KEY MANAGEMENT
ENCRYPTION TYPES
EXAMPLES OF ENCRYPTION USES
MALICIOUS CODE PREVENTION
CONTROLS TO PROTECT AGAINST MALICIOUS CODE
SYSTEMS DEVELOPMENT, ACQUISITION, AND MAINTENANCE
SOFTWARE DEVELOPMENT AND ACQUISITION
SYSTEMS MAINTENANCE
PERSONNEL SECURITY
BACKGROUND CHECKS AND SCREENING
AGREEMENTS: CONFIDENTIALITY, NON-DISCLOSURE, AND AUTHORIZED USE
JOB DESCRIPTIONS
TRAINING
DATA SECURITY
THEORY AND TOOLS
PRACTICAL APPLICATION
SERVICE PROVIDER OVERSIGHT
TRUST SERVICES
SAS 70 REPORTS
BUSINESS CONTINUITY CONSIDERATIONS
INSURANCE
SECURITY MONITORING
ARCHITECTURE ISSUES
ACTIVITY MONITORING
NETWORK INTRUSION DETECTION SYSTEMS
HONEYPOTS
HOST INTRUSION DETECTION SYSTEMS
LOG TRANSMISSION, NORMALIZATION, STORAGE, AND PROTECTION
CONDITION MONITORING
SELF ASSESSMENTS
METRICS
INDEPENDENT TESTS
ANALYSIS AND RESPONSE
SECURITY INCIDENTS
INTRUSION RESPONSE
OUTSOURCED SYSTEMS
SECURITY PROCESS MONITORING AND UPDATING
MONITORING
UPDATING
0 of .
Results for:
No results containing your search query
P. 1
information_security

information_security

Ratings: (0)|Views: 214 |Likes:
Published by rasankalakmal

More info:

Published by: rasankalakmal on Feb 27, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/27/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 37 are not shown in this preview.
You're Reading a Free Preview
Pages 41 to 119 are not shown in this preview.
You're Reading a Free Preview
Pages 124 to 138 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
jjvdneut liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->