SlideShare a Scribd company logo
1 of 13
PLANNING AND IMPLEMENTINGINFORMATION
SECURITY
By John Intindolo
ISSC361
Instructor Thomas Foss
(“Your information is secure,” 2013)
INFORMATION SECURITY
(“Information Security,”)
What is Information Security?
 Information Security is the practice of defending information
from being accessed, used, disclosed, modified, inspected,
recorded, or destroyed by someone who is unauthorized to do so
(“Definintion of information securtiy,” 2012).
CIA TRIAD
(“Cia & infosec,” 2012)
CIA TRIAD CONT’D.
Confidentiality- only allows access to those who need it
Integrity- ensures that the data is not modified by
unauthorized users
Availability- maintains that assets are able to be accessed
by authorized personnel whenever needed
Authenticity- verifies the identity of the user
Accountability- holds users responsible for their actions by
recording and identifying them
Non-repudiation- assures the identities of the parties
involved in a transaction
SECURITY CHOICES
 Rule-based Decisions-Widely accepted
guidelines
 Relativistic Decisions- Trying to outdo
others with similar security issues
 Rational Decisions- Analyzing the situation
and creating a rational solution
RISK ASSESSMENT
(“Safe state- Architecture,” 2010)
SECURITY POLICY
Includes the following:
 Policy
 Scope
 Risk Management
 Definitions of Information Security Terms
 Responsibilities
 Classification of Information
 Computer and Information Control
(“Security,” 2012)
(“Sample information security policy,” 2010)
SECURITY ADMINISTRATION TEAM
 Oversee that the Security Policy is adhered by the
entire organization
 Responsible for the security maintenance of resources
within the organization
(“The infosec team,”)
INCIDENT RESPONSE PLAN
 Guideline for the Incident Response Team that describes
how to handle each and every situation
 Reduces confusion in the event of an incident
 Minimizes downtime in the event of an incident
 Helps to prevent making the same mistakes twice
INCIDENT RESPONSE TEAM
 Prepares all within the organization on security
measures
 Identifies when and if an incident has taken place
 Contains the affected systems and/or devices in order
to prevent further damage
 Eradicates the origin of the incident and removes any
and all traces
 Recovers lost data through the use of clean backups,
ensures there are no vulnerabilities, and looks for a
repeat occurrence
 Looks for ways to constantly improve the handling the
incident and preventing it from happening again
BUSINESS CONTINUITY PLAN
 Impact Analysis
 Recovery Strategies
 Plan Development
 Testing & Exercises
 Maintenance
(“Business continuity plan,” 2012)
(“Business continuity planning,”)
REFERENCES
Business continuity plan. (2012). Retrieved from
http://www.ready.gov/business/implementation/continuity
Business continuity planning lifecycle. (n.d.). Retrieved from
http://upload.wikimedia.org/wikipedia/en/thumb/c/cf/BCPLifecycle.gif/220
px-BCPLifecycle.gif
Cia & infosec. (2012). Retrieved from
http://geraintw.blogspot.com/2012/09/cia-infosec.html
Information security. (n.d.). Retrieved from
http://www.thesecuritypub.com/wp-content/uploads/2013/10/information-
security.jpg
Risk management. (2012). Retrieved from
http://www.guardianconsultants.co.uk/risk.html
REFERENCESCONT’D.
Sample information security policy. (n.d.). Retrieved from
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&ved=0CGY
QFjAC&url=http%3A%2F%2Fwww.nchica.org%2Fhipaaresources%2FSecurity%2FGeneralPoli
cy.doc&ei=jWauUtC2NaLesAS_-
YCACg&usg=AFQjCNGu6BXWB0SmUfxaPCyPnofyYltD1w&sig2=OSYSoVZREnUX1M8S7
5w9xw&bvm=bv.57967247,d.cWc
Safe state- Architecture. (2010). Retrieved from http://hclsecurity.in/safe-state/the-
security-architecture
Security. (2012). Retrieved from http://www.btt-tech.com/level2?sub_id1=48
Smith, R.E., PhD. (2011). Elementary Information Security. Burlington, MA: Jones & Bartlett
Learning.
The infosec team. (n.d.). Retrieved from http://www.bu.edu/infosec/infosec/is/
Your information is secure. (2013). Retrieved from http://www.shipperswarehouse.com/information-
security

More Related Content

Viewers also liked

Alcohol related liver disease: prevention and prediction by Professor Nick Sh...
Alcohol related liver disease: prevention and prediction by Professor Nick Sh...Alcohol related liver disease: prevention and prediction by Professor Nick Sh...
Alcohol related liver disease: prevention and prediction by Professor Nick Sh...Health Innovation Wessex
 
Pm0010 introduction to project management
Pm0010 introduction to project managementPm0010 introduction to project management
Pm0010 introduction to project managementconsult4solutions
 
творча група зно
творча група знотворча група зно
творча група зноservisosvita
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloJohn Intindolo
 
こがねむし会計ソフト出力マニュアル
こがねむし会計ソフト出力マニュアルこがねむし会計ソフト出力マニュアル
こがねむし会計ソフト出力マニュアルManabu Kondo
 
Arquitectura 140126175649-phpapp01
Arquitectura 140126175649-phpapp01Arquitectura 140126175649-phpapp01
Arquitectura 140126175649-phpapp01Kathia Chiquita
 
Planificacion de proyectos
Planificacion de proyectosPlanificacion de proyectos
Planificacion de proyectosKathia Chiquita
 
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.co
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.coPresentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.co
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.codeniarya
 

Viewers also liked (13)

Alcohol related liver disease: prevention and prediction by Professor Nick Sh...
Alcohol related liver disease: prevention and prediction by Professor Nick Sh...Alcohol related liver disease: prevention and prediction by Professor Nick Sh...
Alcohol related liver disease: prevention and prediction by Professor Nick Sh...
 
Penguat transistor
Penguat transistorPenguat transistor
Penguat transistor
 
Pm0010 introduction to project management
Pm0010 introduction to project managementPm0010 introduction to project management
Pm0010 introduction to project management
 
Presentación1
Presentación1Presentación1
Presentación1
 
творча група зно
творча група знотворча група зно
творча група зно
 
ijazahmadCv
ijazahmadCvijazahmadCv
ijazahmadCv
 
ISSC361_Project_John_Intindolo
ISSC361_Project_John_IntindoloISSC361_Project_John_Intindolo
ISSC361_Project_John_Intindolo
 
こがねむし会計ソフト出力マニュアル
こがねむし会計ソフト出力マニュアルこがねむし会計ソフト出力マニュアル
こがねむし会計ソフト出力マニュアル
 
Arquitectura 140126175649-phpapp01
Arquitectura 140126175649-phpapp01Arquitectura 140126175649-phpapp01
Arquitectura 140126175649-phpapp01
 
Diapositivas
DiapositivasDiapositivas
Diapositivas
 
Planificacion de proyectos
Planificacion de proyectosPlanificacion de proyectos
Planificacion de proyectos
 
Maguey o agave
Maguey o agaveMaguey o agave
Maguey o agave
 
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.co
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.coPresentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.co
Presentasi NESIA Terbaru 22 Februari 2016 www.dream4freedom.co
 

Similar to Project_Presentation_ISSC361_Intindolo

Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptxDaveCalapis3
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfasdfg hjkl
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation AssuranceAkshay Pal
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsSounil Yu
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles LearningwithRayYT
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTijesajournal
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 

Similar to Project_Presentation_ISSC361_Intindolo (20)

Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptx
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
Cissp notes
Cissp notesCissp notes
Cissp notes
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Computer security
Computer securityComputer security
Computer security
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
ICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdfICT-security-Lesson-4.pdf
ICT-security-Lesson-4.pdf
 
information security management
information security managementinformation security management
information security management
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation Assurance
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Information Security
Information SecurityInformation Security
Information Security
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 

More from John Intindolo

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloJohn Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloJohn Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloJohn Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloJohn Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloJohn Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloJohn Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloJohn Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloJohn Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloJohn Intindolo
 

More from John Intindolo (16)

Power_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_IntindoloPower_Point_Presentation_ISSC458_Intindolo
Power_Point_Presentation_ISSC458_Intindolo
 
ISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_IntindoloISSC368_Final_Project Proposal_Wk8_Intindolo
ISSC368_Final_Project Proposal_Wk8_Intindolo
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Research_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_IntindoloResearch_Paper_Final_ISSC431_Intindolo
Research_Paper_Final_ISSC431_Intindolo
 
ISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_IntindoloISSC362_Research_Paper_Intindolo
ISSC362_Research_Paper_Intindolo
 
Research_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_IntindoloResearch_Paper_ISSC461_Intindolo
Research_Paper_ISSC461_Intindolo
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_Intindolo
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_IntindoloISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
ISSC455_Week6_Project_PowerPoint_Presentation_Intindolo
 
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_IntindoloWk 7 Case Study Summary Paper_ISSC331_Intindolo
Wk 7 Case Study Summary Paper_ISSC331_Intindolo
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
ISSC490_Project_John_Intindolo
ISSC490_Project_John_IntindoloISSC490_Project_John_Intindolo
ISSC490_Project_John_Intindolo
 

Project_Presentation_ISSC361_Intindolo

  • 1. PLANNING AND IMPLEMENTINGINFORMATION SECURITY By John Intindolo ISSC361 Instructor Thomas Foss (“Your information is secure,” 2013)
  • 2. INFORMATION SECURITY (“Information Security,”) What is Information Security?  Information Security is the practice of defending information from being accessed, used, disclosed, modified, inspected, recorded, or destroyed by someone who is unauthorized to do so (“Definintion of information securtiy,” 2012).
  • 3. CIA TRIAD (“Cia & infosec,” 2012)
  • 4. CIA TRIAD CONT’D. Confidentiality- only allows access to those who need it Integrity- ensures that the data is not modified by unauthorized users Availability- maintains that assets are able to be accessed by authorized personnel whenever needed Authenticity- verifies the identity of the user Accountability- holds users responsible for their actions by recording and identifying them Non-repudiation- assures the identities of the parties involved in a transaction
  • 5. SECURITY CHOICES  Rule-based Decisions-Widely accepted guidelines  Relativistic Decisions- Trying to outdo others with similar security issues  Rational Decisions- Analyzing the situation and creating a rational solution
  • 6. RISK ASSESSMENT (“Safe state- Architecture,” 2010)
  • 7. SECURITY POLICY Includes the following:  Policy  Scope  Risk Management  Definitions of Information Security Terms  Responsibilities  Classification of Information  Computer and Information Control (“Security,” 2012) (“Sample information security policy,” 2010)
  • 8. SECURITY ADMINISTRATION TEAM  Oversee that the Security Policy is adhered by the entire organization  Responsible for the security maintenance of resources within the organization (“The infosec team,”)
  • 9. INCIDENT RESPONSE PLAN  Guideline for the Incident Response Team that describes how to handle each and every situation  Reduces confusion in the event of an incident  Minimizes downtime in the event of an incident  Helps to prevent making the same mistakes twice
  • 10. INCIDENT RESPONSE TEAM  Prepares all within the organization on security measures  Identifies when and if an incident has taken place  Contains the affected systems and/or devices in order to prevent further damage  Eradicates the origin of the incident and removes any and all traces  Recovers lost data through the use of clean backups, ensures there are no vulnerabilities, and looks for a repeat occurrence  Looks for ways to constantly improve the handling the incident and preventing it from happening again
  • 11. BUSINESS CONTINUITY PLAN  Impact Analysis  Recovery Strategies  Plan Development  Testing & Exercises  Maintenance (“Business continuity plan,” 2012) (“Business continuity planning,”)
  • 12. REFERENCES Business continuity plan. (2012). Retrieved from http://www.ready.gov/business/implementation/continuity Business continuity planning lifecycle. (n.d.). Retrieved from http://upload.wikimedia.org/wikipedia/en/thumb/c/cf/BCPLifecycle.gif/220 px-BCPLifecycle.gif Cia & infosec. (2012). Retrieved from http://geraintw.blogspot.com/2012/09/cia-infosec.html Information security. (n.d.). Retrieved from http://www.thesecuritypub.com/wp-content/uploads/2013/10/information- security.jpg Risk management. (2012). Retrieved from http://www.guardianconsultants.co.uk/risk.html
  • 13. REFERENCESCONT’D. Sample information security policy. (n.d.). Retrieved from https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&ved=0CGY QFjAC&url=http%3A%2F%2Fwww.nchica.org%2Fhipaaresources%2FSecurity%2FGeneralPoli cy.doc&ei=jWauUtC2NaLesAS_- YCACg&usg=AFQjCNGu6BXWB0SmUfxaPCyPnofyYltD1w&sig2=OSYSoVZREnUX1M8S7 5w9xw&bvm=bv.57967247,d.cWc Safe state- Architecture. (2010). Retrieved from http://hclsecurity.in/safe-state/the- security-architecture Security. (2012). Retrieved from http://www.btt-tech.com/level2?sub_id1=48 Smith, R.E., PhD. (2011). Elementary Information Security. Burlington, MA: Jones & Bartlett Learning. The infosec team. (n.d.). Retrieved from http://www.bu.edu/infosec/infosec/is/ Your information is secure. (2013). Retrieved from http://www.shipperswarehouse.com/information- security

Editor's Notes

  1. I have decided to do my project paper on the planning and implementing of Information Security. Information Security is important to everyone whether that be an in-home network or a business with multiple computers on their network in several different locations. Without a proper plan in place no network will be secure, therefore the topics going to be discussed throughout will outline the different methods for planning and implementing Information Security on any network.
  2. The basis of Information Security starts with the CIA Triad which is an acronym for Confidentiality, Integrity, and Availability.
  3. The CIA Triad is a model of information assurance that ensures the Confidentiality, Integrity, and Availability of a system. There are three common extensions to the CIA Triad and they are Authenticity, Accountability, and Non-repudiation.
  4. There are three separate types of categories of security choices: Rule-based decisions, Relativistic decisions, and Rational decisions.
  5. Risk Assessment is the first step of a good plan and an essential part of implementing Information Security. It is important to do a full assessment on all assets, vulnerabilities, and threat likelihood’s and then prioritize them from most important to least. The red area of the picture represents the highest risk for assets, vulnerabilities, and threat likelihoods.
  6. A security policy will determine the guidelines that everyone within the organization must follow.