CISMP - Chapter 1 - Information Security Management Principles
CISMP - Chapter 1 - Information Security Management Principles
Information Security
Management Principles
1
Learning objectives
• Identify definitions, meanings and use of concepts and terms across information
security management.
2
Definitions, meanings and use of concepts
and terms across information security
• Confidentiality
⎻ Information not disclosed to unauthorised entities unless access is
legitimate.
• Integrity
⎻ Ensuring completeness and accuracy of information.
• Availability
⎻ Accessible and usable when and where required.
• Non-repudiation
⎻ Unforgeable proof that an action took place.
3
Definitions, meanings and use of concepts
and terms across information security
• Cyber security
⎻ Ensuring networks, systems and information are protected in cyberspace.
• Assets
⎻ Things that have value.
• Asset types
⎻ Information, physical and software.
• Asset value
⎻ Financial, reputational, public image.
• Asset valuation
⎻ The process of establishing the value of assets.
4
Definitions, meanings and use of concepts
and terms across information security
• Threat
⎻ Something having the potential to do harm.
• Vulnerability
⎻ A weakness in an asset or control.
• Control
⎻ Something used to manage (treat) risk.
• Impact
⎻ The damage a threat can cause (also consequence).
5
Definitions, meanings and use of concepts
and terms across information security
• Likelihood
⎻ The chance that something will happen.
• Risk
⎻ The combination of impact and likelihood.
6
Definitions, meanings and use of concepts
and terms across information security
• The types, uses and purposes of controls
⎻ Strategic
• Avoid/Terminate; Share/Transfer, Reduce/Modify, Accept, Tolerate.
⎻ Tactical
• Detective, Corrective, Preventative, Directive.
⎻ Operational
• Physical, Procedural/People, Technical.
• Defence in depth
⎻ Multiple methods of protection within a system rather than a single method.
• Defence in breadth
⎻ Security at the application level.
7
Definitions, meanings and use of concepts
and terms across information security
• Identity, authentication, authorisation and accounting
⎻ Who are you? Prove it; What are you allowed to access; Show an audit trail.
• Accountability
⎻ Tracing actions to a unique entity.
• Audit
⎻ A process for objective evaluation.
• Compliance
⎻ Ensuring policy is being followed.
8
Definitions, meanings and use of concepts
and terms across information security
• Information security professionalism and ethics
⎻ The expectations, behaviours and standards expected of people working in
information security.
9
Definitions, meanings and use of concepts
and terms across information security
• Information assurance
⎻ Confidence that information systems can protect an organisation’s information
security.
• Information governance
⎻ The overarching strategy for information management based on understanding
risks.
10
The need for, and the benefits of
information security
• Information security provides for the protection of business assets and
consequently relates strongly to the other areas of the organisation such as sales,
marketing, production, finance, human resources, legal and regulatory function.
11
The need for, and the benefits of
information security
• Rapidly changing information and business environments have a direct impact
on information security especially in the areas of legislation, technology, and
societal factors such as social media.
12
The need for, and the benefits of
information security
• Information security must have a direct relationship with corporate governance and
other areas of risk management, ensuring that information security fits in to the
organisation’s overall strategy.
13