Page 45 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 45

Unit 3: Building Blocks of Information Security




          10.  Categorize the information on basis of the purpose for which the information is utilized.  Notes
          11.  Without  sufficient safety  in place  to avert  illegal  activities,  an organization’s  most
               significant asset, namely its information, is at risk. Comment.

          Answers: Self  Assessment


          1.   Information security              2.  Physical
          3.   Logical                           4.  Security
          5.   leak                              6.  access control
          7.   Authorization                     8.  Privacy
          9.   accuracy                          10.  Rootkit

          11.  spam                              12.  Confidentiality
          13.  Integrity                         14.  Strategic
          15.  Operational

          3.9 Further Readings




           Books      An Introduction to Computer Security: The NIST Handbook

                      Managing Enterprise Information Integrity: Security, Control and Audit Issues, by IT
                      Governance Institute
                      Principles of Information Security by Michael E. Whitman and Herbert Mattord;

                      Risk Management Guide for Information Technology Systems
                      Risks of Customer Relationship Management: A Security, Control, and Audit Approach
                      by PricewaterHouseCoopers Llp

                      Security, Audit & Control  Features PeopleSoft:  A Technical  and Risk Management
                      Reference Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA




          Online links  www.key.com
                      http://adminguide.stanford.edu/63.pdf






















                                           LOVELY PROFESSIONAL UNIVERSITY                                   39
   40   41   42   43   44   45   46   47   48   49   50