Term
Information Classification |
|
Definition
(Data/Content Classification) |
|
|
Term
|
Definition
|
|
Term
Military Classification Schemes |
|
Definition
Top Secret (Grave Damage to National Security)
Secret (Serious Damage to National Security)
Confidential (Some risk)
Unclassified (No risk) |
|
|
Term
Commercial Classification Schemes |
|
Definition
Corporate (Do not disclouse oustide of Enterprise)
Personal & Confidential (Personal Nature)
Private (Between 2 people)
Trade Secret (Corp. Intellectual Property)
Client Confidential (Client Personal Info/Intellectual Property) |
|
|
Term
|
Definition
|
|
Term
|
Definition
- ID Items to classify
- Evaluate risk of disclosure
- Assign classification level
- Awareness of policies, std, guidelines
|
|
|
Term
|
Definition
- Understand classifications system levels
- Label media as necessary
- Implement system safeguards
- Maintain document access records
- Ensure proper destruction methods are utilized
|
|
|
Term
Security Policy Best Practice (12)
GCEIPADUAPRE |
|
Definition
- Generate high-level security policy
- Create and implement diaster recovery & business continuity plans
- Encourage ethical behavior and use of IT systems
- ID org. data classification/valuation std.
- Protect data/manage appropiate data disposal
- Assess info ownership/resource ctrls
- Determine access ctrl/auth
- Use/Protect Intellectual Property
- Allocate operations/system responsibilities
- Promote security awareness/user responsibilities
- Report/respond to security incidents
- Ensure legal/regulatory compliance
|
|
|
Term
Security Policy Objectives |
|
Definition
-
Inform EEs about security-related duties/responsibilities
-
Define org's security goals
-
Outline system's security requirements
-
Disseminate standardized information (ensures personnel follow security duties)
|
|
|
Term
|
Definition
Advisory
Informative
Regulatory |
|
|
Term
|
Definition
- Indicate appropiate/effective actions
- Include consequences/reprimands
- Indicate how to handle private documentations & money
|
|
|
Term
Informative Security Policy |
|
Definition
- Provide data on specific subject
- Include NO ramifications
- Used as instructional instruments
|
|
|
Term
Regulatory Security Policy |
|
Definition
- Address industry regulations
- Used in health care/financial institutions
|
|
|
Term
Security Document Types (5) |
|
Definition
- Policies (high level document - mgt intensions)
- Standards (required implementations/use)
- Guidelines (reccommended implementations/use)
- Procedures (step by step documentation)
- Baselines (doc. w/min. security required for system/process)
|
|
|
Term
Security Policy Process (3 steps) |
|
Definition
- Overall document environment is controlled by policies
- Standards & Guidelines prepared to implement policies
- Procedures & Baselines created to implement Standards & Guidelines
|
|
|
Term
Organizational Policy Roles (3) |
|
Definition
CEO/Board of Directors
Security Dept.
All staff/employees |
|
|
Term
|
Definition
-
Strategic: long range planning (major changes/security improvements; 5 years +)
-
Tatical: mid-term planning (1-4 years)
-
Operational/Project: near-term (next 12 months)
|
|
|
Term
Security Awareness & Training (3) |
|
Definition
- Promote security awareness & provide effective training
- Develop security awareness training pts
- Offer online/instructor-led training
|
|
|
Term
Plan Professional Career Development/Training (4) |
|
Definition
- Offer necessary training
- Vendor training during product announcement/upgrades
- Invest in career development
- Encourage org. security memberships (national/local)
|
|
|
Term
Develop Security Awareness Training Points (8) |
|
Definition
- Address PW Protection
- Discuss Info Protection
- List procedures to follow (unauthorized visitor)
- ID tatics to combat Social Engineering
- Characterize email threats
- Analyze virus/worm protection
- Assess Info. disclosure protection
- Review VPN practices to protect data
|
|
|
Term
Offer online/instructor-led training (2) |
|
Definition
- contract w/commercial vendors for product specific/general security training
- arrange mandatory, instructor-led presentations/seminars
|
|
|