You are on page 1of 9
is Vonportance, te 258 Yo the Eb on misuse. CN Oxganizattans broadly cla D_Labeling (0 specify ts Warmous ways t= ay A Cb) Di'sha'bution ( \alha_gets to see /: () Duplication (how. scephias cece made £ land i) Release ( Hau it '5_xeleased (e) Stomage ( Where 14 1's stored) CE\Enexy pton (plain text av ctphe sf 4) Disposal (ulthether i+ I's tenne permanent Pee ty deleted) | 0h) Methads af ‘rronsmnissiinn (Mail, far ets IC | YCarmpanies may have confidential \efare T Uch as research and develop no processes Strategice co duct sod roap ,process—s 2: tact information, Anant a pnouncements,thatt lon a _need-to= Know bast reports an: preeeirtia, San ie ee d Imantion these cntrols.. 5 Do 413 ore EF Rare: ee detection ,.0. sec e t xc een Kenct E 1 ; Miced Fox hours +dai -—Ye Deterrence ;~ ie a Rees Pe considered +5 be an effechive ra! Ee pees the Frequency of secuntty t, sthereby the ctotal loss due to secur “ idents ho Tin With the use of deterrent conbenls sudo bth orttock errs these, may decide nokta couse dasa ys sor elen Ferc Hoe. ae 0} What 1's_Sec welt enedrodology 2 sie —— Vans: (i) The Preld of secuntty ts concerned salts 5 le Tecting assets va genexals———— _s Afesmation security 1s conce: \ 5 srmatan in all tts Feces eee 2 tect 'ng tore a bonitteny spoken electronic, o-taphieal 07 ustng— pare othe methods of communicattinns —— Hitt retsoorks_secarstry ts _cancecned. 40's parebec=! ae software ONO _computea— hardware, and 5) eg data + , of Set «are related | a 2 netwo+k r (ty The various bx anches_ef Secust s 7 te each other} 0 greater or ats extent f ly ginal} ill: by tae ees = ye:g-The Magnet Line+ Ea th i 1930S a defend Fscance oe ai nema Nn +S one-of the biggest del ens! io hisherry = p-sibctce poxdex defense oe (ces$ Promoter Side. were never finshed, lack of | sed jt to lose yts. eFFechVenes = i Phanges.in_woarFare ao made blocteting | — a human_attackers_on Foot obsolete : The Maly a ine serves .ds_usefll analogy -to madern = faignoning threats +ha+ go avcound Street “I opal yz d_far'ling to_pxoperly —marintal'n the Pree, : conan L Form_and configura Hom can creduce 2 a a 2 juvewey [tthe frrewallls defensive effectiveness. “ith s ay Se | —taccess (5) pinite the note on CTA: = = | be tad Ansi=\() CTA Refers to Confidentiality , Tategrity j ! | Availabili44 node! which 1s used to define | _=_ MiConfidenHality '- a ._ aa © Cis refers to seh oF rules that limits ace Sl ans: CPT —'nformation x } pi fers ability to hide information Eromunauthed (isa —tsed_person +0 vi'eus 4'b pe ae ba ‘tne d Citi) it's on bimportant aspect of CTA tad wale Avuling Sit Comes to secur $e cu a5 pb comrecpandingly | 14's al go the anehich @ heat] —— attacked most often 2 __@ _osisieg B 0).Cryptogyaphy 4 encryoH'on methods arte _examph —_1Gv —— eR attenptt's to ensure confidential: of datas 2 teks gee teed From one compute tn nother clo —(hYTategrity:- t ! 4 —— {at {0} Fs ccef ers to_assurance. thatthe inferrmatang — a ert Stiorctiny and acurrate — key YTB ability ete. On ve sthat data t's an accurate s— a | a : = (vi) Tl } $£d_scepresemtaHon of the original _se———— r ee CE a L ° Pant te ensure 4 the Concerned \y x tae aes ewe ot alltime = e [~~ same Secu a acres sto! tty LNC\'n, fp Setendlety erect. Ol nica, CW The athackex Beds only 40 find sea >——$§ the defender must Er Sau ln erabrt ~ 155 Ii Tre attack on has no cules =the Follow unusual paths abuse the trisha! —tsystem ox ves oxt te destruct’ intact pain iimize damage, and keen cas : —toloun ein ae 2 iS oe ae —!60Tr an extreme examole - The atha ecan.cub through the exterior, break the wl ‘ -— 1 kno, ole acho call Sor se bh the ho a Aisce yn case oF destroying or srabb! ng houses. _} Pt damencmens haye ct thely ass Cf 1g. 40 prate cos iL in) of attacks Halnot ore the different sources and tayaohout threat ie ee oa P Bnss-/()Security conteals can be logically q-rauned j sever | cotenes se 7 | _@) | Preventanive = Blocks secuxthy Heats hetans xplott a _yulne: abl lity aM an, noVid 2 _N9! |] (b)| Detech've= tiscaver and sattacks or mi'suée When +he -happen. (Cc) Deterrent — Di'scoutage outsider attack cy viola Ho ns. J ——__{Linsi'der pal 4 a —__)co-rrech've - Restore the Hotegu by of data ore | —____lar another asset. ‘ | Ce} Recavery= Restore +he availability of a seevite | CE )!Compensative - Tra layered security s 4 iprovide protectian even when another con ald I eatg. | —__lGFach category of secunty control nay fo variety of troolementations da pe-teck a jStdiffecent threat vectors’ | Physica =Controls that ame physically Lin sceq) oor | z 1s and ——h)|_Administrat've= controls defined ve by rnanagement 4 uae teal — Techno og || by machines Perattonal ~ canteale a, Eas on by Sneea Cs, ah atone pet Slo. [= Coneenlis shad awe ai ee staat once to ie sactgqecced_ | S rt fen ctvcumstances. eorigen os Gol thats the “advanced lassi ae ey sistent thee : 3 Pen sconces Uitoe ae 9 Expla.| Aas POT san attack tn ishich an @unaaieee eed _ a GOINs access pp a_syskem or ne tus eemains there For an extended perisd eoitxail ~~ Hetected state a — i t+ do not cause clamage +o Company nebdor! 0% local_machi'nes - nstead the goal GF APTs ‘6 i's most often data thett A a Git) By sendi'ng an infected dacument;such as | a la pdt Fite 40 the wickton, aly ! = bk —_||}evable epnai'| message sto duet the Ween yin: opening +e fle ___ IU attacker may send o URI that patnd-s tothe — web server Mas The best cay tod aor a ack +o a Known Cac sexver cnc_teemne} heuristic behaviouy detection that ges made hy tine. roo ble 4 — nook callb 19,6 advanc + Con dent fy thre chan awe n_of _Inferdt on — 2 a ort ‘ono. 7 : a a I APT s ia 13 tees oe buy _opentng. Infected PDEs, 1 od prer've =bs so j ied 20 L i URLS e&C a : es 1 Tae ee phi'shiing— TaxgeHing-a-spect'Ee teal dae. or small group. of people wl tao. tatloved = Lae Pa Elin tach oe th a . | j Give sreal—Hime protectan yp assessing —a\si<_by_usi'ng eummbers: Qualitative aigse— SS tssments uses nan-numerical cay mies or levelg.———_| sero | ae Use Scales | once i dive number Responding cto &i'sk - How omgany How oxgantaation acespond +0 Pols Be ant V's de texmined_based on results of 7 1a -risk a sment PMonittoniing 81's = How oxgan izaHions_manite | Sk ayer Hime- be cle berm ne the ong tag effec €ss_of the nt'sk response

You might also like