Page 167 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 167
Unit 11: Security Models & Frameworks and Methodologies for Information System Security
Notes
Notes It is appealing to note that the IEM can be conducted either following, or in
combination with, the IAM. In difference to the IAM, the IEM will execute actual testing of
systems, validating findings physically to make sure accuracy of reporting. The deliverable
from the IEM is more important and complete than the IAM report, offering analysis,
matrices, and reporting of findings.
11.4.3 Security Incident Policy Enforcement System (SIPES)
Its purpose is to offer a methodology for defining and executing a Security Incident Policy
Enforcement Systems. This methodology is planned for completeness. Though, because of its
status as an “Incomplete” work that has not confirmed progress over the past two years, it is
supposed that work has not sustained and that this methodology is, actually, obsolete. The
listing is offered here for completeness.
The Security Incident Policy Enforcement System (SIPES) draft displays a relatively abstract
method to addressing the difficulty of incident response management. The paper begins by
deconflicting the description of failure inside IT systems and then proceeds to build its “state-
full” methodology. The fundamental approach is to converse security state and those points
where states modify. By means of that dynamic basis, they then move into the argument for
incident policy enforcement, with numerous sidebars into what each of these terms means.
Task Illustrate the function of SIPES.
Self Assessment
Fill in the blanks:
11. A ......................... is a targeted build that defines particular practices, procedures, and rules
for accomplishment or execution of a particular task or function.
12. ......................... is concentrated on offering a high-level assessment of “a specified, operational
system for the reason of identifying possible vulnerabilities.
13. The purpose of ......................... is to provide a technique for technically assessing
susceptibility in systems and to legalize the actual INFOSEC posture of those systems.
14. The ......................... draft displays a relatively abstract method to addressing the difficulty
of incident response management.
15. In IAM , the ......................... phase is proposed to build up a general perceptive of customer
needs, classify target systems, and institute the “rules of engagement” for the assessment.
11.5 Summary
A model is an theoretical, conceptual build that represents processes, variables, and
associations without offering particular guidance on or practice for execution.
The purpose of McCumber Cube is to offer an information-centric model that captures the
association among the disciplines of interactions and computer security, without the
restrictions of organizational or technical modifications.
LOVELY PROFESSIONAL UNIVERSITY 161