SlideShare a Scribd company logo
Identify the three major types of controls that organizations can use to protect their information
resources ?
Solution
1. At secure organizations, information security is supported by senior management. Support
includes making resources and budget available for information security, as well as clear
statements by senior management that information security is a priority for the organization.
Since senior managers establish priorities and set the tone for an organization, it is difficult to be
a secure organization without their clear and consistent support. As a result of the recent spate of
high-profile security breaches, most senior managers now understand the importance of
information security and will support information security efforts.
2. Secure organizations regularly identify and document how sensitive data --customer and/or
proprietary -- flows in, through and out of the organization. This enables an organization to focus
its time, effort and money on protecting its sensitive data. Conversely, it's difficult for an
organization to protect what it doesn't know about, and organizations struggle to protect their
data if they don't perform this exercise
3. Secure organizations create and maintain a formal, documented inventory of all systems that
process, transmit or store sensitive data -- including the operating system, if it's physical or
virtualized, and what major applications have been installed. Without such an inventory, an
organization can't fully understand what systems it must protect. Having such an inventory
allows an organization to quickly determine whether a particular security vulnerability is relevant
to the organization's systems.
4. Secure organizations segment sensitive systems from non-sensitive systems through jump
servers, firewall rules, router ACLs or switch VLANs. This minimizes the attack surface for an
organization's sensitive systems and allows access to the systems to be tightly controlled and
logged.
5. Secure organizations have a strong change-control process that is rigorously enforced.
Changes, including emergency changes, are fully documented then formally reviewed and
approved. Unapproved changes can lead to security vulnerabilities that nobody knows about
until there's a breach.
6. Secure organizations have a strong configuration management process. Sensitive systems are
hardened and built only with necessary functionality via an automated build process or a
managed configuration software tool such as Puppet or Chef. After the initial build,
configuration software tools, which regularly check the configuration of systems, are used to
ensure systems stay hardened or strong change control is used to maintain system configuration
and prevent server creep.

More Related Content

Similar to Identify the three major types of controls that organizations can us.pdf

Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docx
ToobaTanvir3
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
AdityaMishra105898
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
Nexlar Security
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
KeenboonAsaffaa
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
Harshada Mulay
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
insider threat research
insider threat researchinsider threat research
insider threat research
Asma Al-maskaria
 
Information security - 360 Degree Approach
Information security - 360 Degree ApproachInformation security - 360 Degree Approach
Information security - 360 Degree Approach
harsh arora
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
james morris
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
joellemurphey
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentjenito21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
Jeffery Brown
 

Similar to Identify the three major types of controls that organizations can us.pdf (20)

Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docx
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
unveiling-the-true-potential-of-identity-strengthening-security-through-compl...
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Information security - 360 Degree Approach
Information security - 360 Degree ApproachInformation security - 360 Degree Approach
Information security - 360 Degree Approach
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
 
R.a 1
R.a 1R.a 1
R.a 1
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 

More from fasttrackscardecors

On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdfOn a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
fasttrackscardecors
 
Molecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdfMolecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdf
fasttrackscardecors
 
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdfMissy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
fasttrackscardecors
 
Justify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdfJustify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdf
fasttrackscardecors
 
Inventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdfInventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdf
fasttrackscardecors
 
IncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdfIncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdf
fasttrackscardecors
 
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdfIf you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
fasttrackscardecors
 
I have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdfI have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdf
fasttrackscardecors
 
I need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdfI need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdf
fasttrackscardecors
 
How is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdfHow is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdf
fasttrackscardecors
 
Fungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdfFungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdf
fasttrackscardecors
 
For each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdfFor each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdf
fasttrackscardecors
 
For each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdfFor each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdf
fasttrackscardecors
 
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdfExplain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
fasttrackscardecors
 
Find all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdfFind all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdf
fasttrackscardecors
 
Describe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdfDescribe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdf
fasttrackscardecors
 
describe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdfdescribe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdf
fasttrackscardecors
 
Connect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdfConnect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdf
fasttrackscardecors
 
Consider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdfConsider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdf
fasttrackscardecors
 
Case History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdfCase History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdf
fasttrackscardecors
 

More from fasttrackscardecors (20)

On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdfOn a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
On a Sunday in April, dog bite victims arrive at Carver Memorial Hos.pdf
 
Molecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdfMolecules like glucose usually need a special transporter protein to.pdf
Molecules like glucose usually need a special transporter protein to.pdf
 
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdfMissy Crane opened a public relations firm called Goth on August 1, 2.pdf
Missy Crane opened a public relations firm called Goth on August 1, 2.pdf
 
Justify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdfJustify that the following circuit represents the functionality of a .pdf
Justify that the following circuit represents the functionality of a .pdf
 
Inventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdfInventor classwhat is the purpose of using assemply constraints.pdf
Inventor classwhat is the purpose of using assemply constraints.pdf
 
IncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdfIncompressibilityI cant understand some parts in a book.The .pdf
IncompressibilityI cant understand some parts in a book.The .pdf
 
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdfIf you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
If you were to illuminate an Elodea leaf with light at 550 nm, would.pdf
 
I have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdfI have C++ question that I do not know how to do, Can you teach me t.pdf
I have C++ question that I do not know how to do, Can you teach me t.pdf
 
I need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdfI need proper and details explanation for this case study Financial .pdf
I need proper and details explanation for this case study Financial .pdf
 
How is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdfHow is Vietas contribution to mathematics distinctly modern in spi.pdf
How is Vietas contribution to mathematics distinctly modern in spi.pdf
 
Fungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdfFungal associations with plants Examine a type of fungal association .pdf
Fungal associations with plants Examine a type of fungal association .pdf
 
For each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdfFor each problem in this homework, your assignment is to determine .pdf
For each problem in this homework, your assignment is to determine .pdf
 
For each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdfFor each story problem, identofy the opertaion and the interpretatio.pdf
For each story problem, identofy the opertaion and the interpretatio.pdf
 
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdfExplain a. casting b. overloading c. sentinel d. echoSolution.pdf
Explain a. casting b. overloading c. sentinel d. echoSolution.pdf
 
Find all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdfFind all the square roots of the complex number 14i. Write the squar.pdf
Find all the square roots of the complex number 14i. Write the squar.pdf
 
Describe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdfDescribe the flow of oxygenated blood from the placenta to the fe.pdf
Describe the flow of oxygenated blood from the placenta to the fe.pdf
 
describe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdfdescribe two different forms of bindingSolutionTwo forms Co.pdf
describe two different forms of bindingSolutionTwo forms Co.pdf
 
Connect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdfConnect onnect mheducation.co.pdf
Connect onnect mheducation.co.pdf
 
Consider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdfConsider the following interrupting system. The active-edge inputs o.pdf
Consider the following interrupting system. The active-edge inputs o.pdf
 
Case History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdfCase History- An 11-month old Boy whos blue and short of breathC.pdf
Case History- An 11-month old Boy whos blue and short of breathC.pdf
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Identify the three major types of controls that organizations can us.pdf

  • 1. Identify the three major types of controls that organizations can use to protect their information resources ? Solution 1. At secure organizations, information security is supported by senior management. Support includes making resources and budget available for information security, as well as clear statements by senior management that information security is a priority for the organization. Since senior managers establish priorities and set the tone for an organization, it is difficult to be a secure organization without their clear and consistent support. As a result of the recent spate of high-profile security breaches, most senior managers now understand the importance of information security and will support information security efforts. 2. Secure organizations regularly identify and document how sensitive data --customer and/or proprietary -- flows in, through and out of the organization. This enables an organization to focus its time, effort and money on protecting its sensitive data. Conversely, it's difficult for an organization to protect what it doesn't know about, and organizations struggle to protect their data if they don't perform this exercise 3. Secure organizations create and maintain a formal, documented inventory of all systems that process, transmit or store sensitive data -- including the operating system, if it's physical or virtualized, and what major applications have been installed. Without such an inventory, an organization can't fully understand what systems it must protect. Having such an inventory allows an organization to quickly determine whether a particular security vulnerability is relevant to the organization's systems. 4. Secure organizations segment sensitive systems from non-sensitive systems through jump servers, firewall rules, router ACLs or switch VLANs. This minimizes the attack surface for an organization's sensitive systems and allows access to the systems to be tightly controlled and logged. 5. Secure organizations have a strong change-control process that is rigorously enforced. Changes, including emergency changes, are fully documented then formally reviewed and approved. Unapproved changes can lead to security vulnerabilities that nobody knows about until there's a breach. 6. Secure organizations have a strong configuration management process. Sensitive systems are hardened and built only with necessary functionality via an automated build process or a managed configuration software tool such as Puppet or Chef. After the initial build, configuration software tools, which regularly check the configuration of systems, are used to
  • 2. ensure systems stay hardened or strong change control is used to maintain system configuration and prevent server creep.