Page 45 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 45
Unit 3: Building Blocks of Information Security
10. Categorize the information on basis of the purpose for which the information is utilized. Notes
11. Without sufficient safety in place to avert illegal activities, an organization’s most
significant asset, namely its information, is at risk. Comment.
Answers: Self Assessment
1. Information security 2. Physical
3. Logical 4. Security
5. leak 6. access control
7. Authorization 8. Privacy
9. accuracy 10. Rootkit
11. spam 12. Confidentiality
13. Integrity 14. Strategic
15. Operational
3.9 Further Readings
Books An Introduction to Computer Security: The NIST Handbook
Managing Enterprise Information Integrity: Security, Control and Audit Issues, by IT
Governance Institute
Principles of Information Security by Michael E. Whitman and Herbert Mattord;
Risk Management Guide for Information Technology Systems
Risks of Customer Relationship Management: A Security, Control, and Audit Approach
by PricewaterHouseCoopers Llp
Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
Reference Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA
Online links www.key.com
http://adminguide.stanford.edu/63.pdf
LOVELY PROFESSIONAL UNIVERSITY 39