Page 169 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 169

Unit 11: Security Models & Frameworks and Methodologies for Information System Security




          3.   Depict the advantages and disadvantages of security models.                      Notes
          4.   What is a framework? Illustrate the concept of security framework.
          5.   Elucidate the benefits and considerations of a security framework.
          6.   Discuss the purpose of ISO 27001 and illustrate the use of it.

          7.   Illustrate the  perception of  COBIT framework  and explain the four stages included in
               COBIT.
          8.   Enlighten  how  SSE-CMM  is  used  as a  common  framework  for  executing  security
               engineering within an organization.
          9.   Make distinction  between INFOSEC Assessment Methodology  (IAM) and  INFOSEC
               Evaluation Methodology (IEM)
          10.  The Security Incident Policy Enforcement System (SIPES) draft displays a relatively abstract
               method to addressing the difficulty of incident response management. Comment.

          Answers: Self  Assessment


          1.   models                            2.  abstract
          3.   high-level                        4.  beta
          5.   INFOSEC                           6.  framework
          7.   framework                         8.  COBIT
          9.   SSE-CMM                           10.  security

          11.  methodology                       12.  IAM
          13.  IEM
          14.  Security Incident Policy Enforcement System (SIPES)

          15.  pre-Assessment
          11.8 Further Readings





           Books      An Introduction to Computer Security: The NIST Handbook
                      Managing Enterprise Information Integrity: Security, Control and Audit Issues, By IT
                      Governance Institute

                      Principles of Information Security by Michael E. Whitman and Herbert Mattord;
                      Risk Management Guide for Information Technology Systems
                      Risks of Customer Relationship Management: A Security, Control, and Audit Approach
                      by PricewaterHouseCoopers Llp
                      Security, Audit & Control  Features PeopleSoft:  A Technical  and Risk Management
                      Reference Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA




          Online link  citeseerx.ist.psu.edu




                                           LOVELY PROFESSIONAL UNIVERSITY                                   163
   164   165   166   167   168   169   170   171   172   173   174