AUDCIS Information Security
AUDCIS Information Security
Security
Learning Objectives
01 02 03 04 05 06 07 08 09
Discuss recent
technologies
Describe the that Describe audit
importance of revolutionize involvement in
information organizations’ Discuss an information
security to IT information Describe Discuss roles security control
organizations environments security threats relevant and responsi- Explain what Describe the examination
and how and the and risks, and information bilities of information significance of and provide
information significance of how they security Explain what an various security selecting, reference
represents a implementing represent a standards and information information controls are, implementing, information on
critical asset in adequate constant guidelines security policy system groups and their and testing tools and best
today’s security to challenge to available for is and illustrate within importance in information practices to
business protect the information organizations examples of its information safeguarding security assist such
organizations information. systems. and auditors. content. security. the information. controls. audits.
Information Security
Distributed
Denial-of-
denial-of- Viruses Trojan horse
service attack
service
Criminal groups
Hackers
Hacktivists
Disgruntled insiders
Terrorists
Information Security Standards
Others
• ITIL
COBIT ISO/IEC 27002 NIST • PCI-DSS
• CSA
Information Security Policy
• General—Includes information security policy templates covering the areas of: Acceptable
Encryption Policy, Acceptable Use Policy, Clean Desk Policy, Data Breach Response
Policy, Disaster Recovery Plan Policy, Digital Signature Acceptance Policy, Email Policy,
Ethics Policy, Pandemic Response Planning Policy, Password Construction Guidelines,
Password Protection Policy, Security Response Plan Policy, and End User Encryption Key
Protection Policy.
• Network Security—Includes information security policy templates covering the areas of:
Acquisition Assessment Policy, Bluetooth Baseline Requirements Policy, Remote Access
Policy, Remote Access Tools Policy, Router and Switch Security Policy, Wireless
Communication Policy, and Wireless Communication Standard.
Information Security Policy Categories
Information Information
Owner Custodian
Responsibilities Responsibilities
User Third-Party
Responsibilities Responsibilities
Information Security Controls
• Vulnerabilities
• Weaknesses or exposures in IT assets or processes that may lead to a business risk or a
security risk
• Vulnerability Management Process
• Identification
• Evaluation
• Remediation
Threat Management