Information
Columbia Southern University
SECURITY
Discussion Outline
Goals of Information SecurityThree Sources of Information Security ThreatsTechnical SafeguardsData SafeguardsHuman SafeguardsAre Incident Response Teams Needed?
Goals of Information Security – Mobile Devices
Apply Appropriate Data, Technical, and Human SafeguardsRisk vs. Cost TradeoffsStopping ThreatsSecurity vs. FreedomEncrypting Devices for Better Protection
Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.
What are the Three Sources of Threats?
Human ErrorComputer CrimeNatural Events and Disasters
Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.
Types of Safeguards
Technical Safeguards
Identification and AuthorizationEncryptionFirewallsMalware ProtectionApplication Design
Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.
Data Safeguards
Data Rights and ResponsibilitiesPasswordsEncryptionBackup and RecoveryPhysical Security
Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.
Human Safeguards
HiringTrainingEducationProcedure DesignAdministrationAssessmentComplianceAccountability
Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: Pearson.
Having an Incident Response Team
Handle Cybersecurity IncidentsMinimize the impact of the threats if they occurStrengthen the company defenses against future incidentsExperts in each fieldHuman ResourcesLegalCybersecurityManagement Team
Joseph, K.G. (2015). The Importance of Having an Effective Incident Response Team. SecirityIntelligence. Retrieved from https://securityintelligence.com/the-importance-of-having-an-effective- incident-response-team/
References
Joseph, K.G. (2015). The Importance of Having an Effective Incident Response Team. SecirityIntelligence. Retrieved from https://securityintelligence.com/the- importance-of-having-an-effective-incident-response-team/Kroenke, D. (2018). Using MIS (10th ed.). New York, NY: PearsonMabel, Meng, and Quana, (n.d.). Technical Safeguards. Google Sites. Retrieved from https://sites.google.com/site/ifsecurities/home/information-security- program/technical-safeguards