Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. How can a security framework assist in the design and implementation of a sec

ID: 3557886 • Letter: 1

Question

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it?

2. Where can a security administrator find information on established security frameworks?

3. What is the ISO 27000 series of standards? Which individual standards make up the series?

4. What are the inherent problems with ISO 17799, and why hasn't the United States adopted it? What are the recommended alternatives?

5. What documents are available from the NIST Computer Resource Center, and how can they support the development of a security framework?

6. What benefit can a private, for-profit agency derive from best practices designed for federal agencies?

7. What Web resources can aid an organization in developing best practices as part of a security frarriework?

8. Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework.

9. What 'are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

10. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology?                                                                                                                                                      

11. What is contingency planning? How is it different from routine management planning? What are the components of contingency planning?

12. When is the IR plan used?

13. When is the DR plan used?

14. When is the BC plan used? How do you determine when to use the IR, DR, and BC plans?

15. What are the five elements of a business impact analysis?

16. What are Pipkin's three categories of incident indicators?

17. What is containment, and why is it part of the planning process?

18. What is computer forensics? When are the results of computer forensics used?

19. What is an after-action -review?When is it performed? Why is it done?

20. List and describe the six continuity strategies identified in the text.

Explanation / Answer

1)

A security framework provides a better view of the security strategies. It gives a clear idea about implementing security in an organization. Using various frameworks, the suitable strategies can be extracted and implemented. The framework provides a road map for the changes to be made. So using a framework, the tasks to be performed and changes required can be assessed. It makes the security plan easy.

Information security governance is the process of handling various security measures. It involves safeguarding the information and providing security to information by applying various policies and procedures. It includes ensuring the security. The respective tasks must be monitored and should ensure security.

The top management involving executives or managers of the organization must plan for information security governance. They must ensure that the task are being implemented and accomplished properly.

2)

A security administrator can look to the Information Technology- Code of Practice for

Information Security Management, ISO 17799/BS 7799 as well as ISO 17799/BS 7799, the NIST Security Models including the SP 800-12, 14, 18, 26, and 30, and the VISA International Security Model are just a few of the established security frameworks available.

3)

ISO 27004

ISO 27005

ISO 27000 series of standards are

Series standard        status          Title or topic                                 comment

27000                   planned          series Overview and                Defines terminology and                     

                                                    Technology                             vocabulary for the standard

                                                                                                    Series.

27001                   2005             Information security and          Drawn from BS 7799:2

                                                  Management

27002                  2007             Code of practice for information Renamed from ISO/IEC

                                                 Security management                    17799, drawn from

                                                                                                          BS 7799:1

27003                 planned           Information security                    Expected in 2008                                         

                                                   Management systems

                                                   Implementation

                                                   Guidelines                                       

27004                planned          Information security                    Expected in 2008

                                                 Measurements and metrics      

27005                planned          ISMS Risk management             Expected in 2008 or later

27006                2007               requirements for bodies         Is largely intended to support

                                                 Providing Audit and               the accreditation of

                                                 Certification of an ISMS        certification bodies

                                                                                                 Providing ISMS                               

                                                                                                 Certification.

The individual standards make up the series are

ISO 27000

ISO 27003

4)

The problems include: