Page 167 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 167

Unit 11: Security Models & Frameworks and Methodologies for Information System Security




                                                                                                Notes


             Notes  It is appealing to  note that the IEM can be  conducted either  following, or  in
             combination with, the IAM. In difference to the IAM, the IEM will execute actual testing of
             systems, validating findings physically to make sure accuracy of reporting. The deliverable
             from the IEM is more important and complete than the IAM report, offering analysis,
             matrices, and reporting of findings.

          11.4.3 Security Incident Policy Enforcement System (SIPES)

          Its purpose is to  offer a methodology  for defining and  executing a Security Incident  Policy
          Enforcement Systems. This methodology is planned for completeness. Though, because of its
          status as an “Incomplete” work that has not confirmed progress over the past two years, it is
          supposed that work has not sustained and that this  methodology is, actually, obsolete. The
          listing is offered here for completeness.
          The Security Incident Policy Enforcement System (SIPES) draft displays a relatively abstract
          method to  addressing the difficulty of incident response management. The  paper begins by
          deconflicting the description of failure inside IT systems and then proceeds to build its “state-
          full” methodology. The fundamental approach is to converse security state and those points
          where states modify. By means of that dynamic basis, they then move into the argument for
          incident policy enforcement, with numerous sidebars into what each of these terms means.




              Task  Illustrate the function of SIPES.

          Self Assessment


          Fill in the blanks:
          11.  A ......................... is a targeted build that defines particular practices, procedures, and rules
               for accomplishment or execution of a particular task or function.

          12.  ......................... is concentrated on offering a high-level assessment of “a specified, operational
               system for the reason of identifying possible vulnerabilities.
          13.  The  purpose of  ......................... is  to  provide  a  technique  for  technically  assessing
               susceptibility in systems and to legalize the actual INFOSEC posture of those systems.
          14.  The ......................... draft displays a relatively abstract method to addressing the difficulty
               of incident response management.
          15.  In IAM , the ......................... phase is proposed to build up a general perceptive of customer
               needs, classify target systems, and institute the “rules of engagement” for the assessment.

          11.5 Summary


              A  model is  an theoretical, conceptual build that represents  processes, variables, and
               associations without offering particular guidance on or practice for execution.

              The purpose of McCumber Cube is to offer an information-centric model that captures the
               association among the disciplines of interactions and computer  security, without  the
               restrictions of organizational or technical modifications.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   161
   162   163   164   165   166   167   168   169   170   171   172