You are on page 1of 1

A.

Fundamental Principles of Security AIC triad


21

vulnerability 1

threat 1

the Code of Ethics risk 1


4
B. Security Definitions exposure
11
The Computer Ethics Institute S. Ethics 1

The Internet Architecture “control,” “countermeasure,” and


10
threat agent
asset
8
Metrics R. Security Governance
1 33
C. Control Types
minimize the risks by 2 15
7 implementing preventive

12
Hiring Practices Security Program 22

6
Onboarding Q. Personnel Security Enterprise Architecture
Termination Development 22
3

Security Awareness Training D. Security Frameworks Security Controls 39


3
Process Management
Development 38
12
Concepts
Life cycle 38
27
Standards and Best
Making BCM Part of the
P. Business Continuity and Disaster Recovery
Enterprise Security Program • 18 USC 1029 1

99+
BCP Project Components • 18 USC 1030 1

• 18 USC 2510 et seq.


E. The Crux of Computer Crime Laws 1
Commonly Accepted Risk • 18 USC 2701 et seq. 1
13
Management Frameworks O. Risk Management Frameworks
• Digital Millennium Copyright Act
• Cyber Security Enhancement Act of

1
NIST SP 800-161
N. Supply Chain Risk Management
Domain 1. Security
Upstream and Downstream Management Practices Electronic Assets
16
18/04/2020 - Rev. 659 F. Complexities in Cybercrime The Evolution of 14

four main goals International Issues


4 67

Risk Assessment Team


The Value of Information and Assets Trade Secret 1

16
Costs That Make Up the Value Copyright
Identifying Vulnerabilities and Trademark 2
Methodologies for Risk G. Intellectual Property Laws
Patent
52
A M. Risk Assessment and Analysis 1

10
Risk Analysis Approaches Internal Protection of Intellectual
Qualitative Risk Analysis Software Piracy 7
3

4
Protection Mechanisms
Personally identifiable
Total Risk vs. Residual Risk information (PII)
3 20
Handling Risk
1 H. Privacy Law
41

Ways to Deal with


4
12
Threat Modeling Concepts Pi
L. Threat Modeling
5
Threat Modeling Methodologies
U.S. Laws Pertaining to Data 5
I. Data Breaches Other Nations’ Laws Pertaining to
1
Concept Data Breaches
7
the major categories
Holistic Risk Management K. Risk Management Level 6
4

Information Systems Risk Security Policy 24

26 Management Policy Standards 2


J. Policies, Standards, Baselines, Guidelines, and Baselines 2
P d
Guidelines 1

Procedures 1

Implementation 1

You might also like