module = Module( code="ELEE1171", name="Securing Technologies", credits=15, module_leader="Seb Blair BEng(H) PGCAP MIET MIHEEM FHEA" )
5 Supporting A’s
Identity is declaring who you are:
Authentication is confirming who you say you are:
Authorisation talks about what you can or cannot do:
*Business enabler
*When IT Security is strategically aligned, security becomes a business enabler that adds value *Major goal is the protection of the entity from harm and contributing to Organisation success.
To provide clarity about what is expected of employees and 3rd parties when it comes to data security and use of systems and applications. That is, how they can maintain security of both data and applications.
Some important policies {could be renamed or added to as business requires}
Implementing Cyber Security Policies “provide assurance that information is being managed securely and in a consistent and corporate way”
Informative: The primary purpose of an informative policy is to educate and inform the readers or stakeholders about a particular subject matter, procedure, or set of expectations. These policies are typically designed to be clear, concise, and easily understood by the intended audience. E.g., Privacy policy, health & safety policy, employee handbooks etc:
Key: GLBA and Sox: Financial | FISMA: Federal agencies | GDPR & DPA: Data protection | HIPAA: Health | PCIDSS: Credit & Debit cards
Take note of the difference between ISO27001 and 27002 | Remember how they work together
* Based on OECD Guidelines for Security of Info systems
*Hint: You need to know and understand this
…to be continued | Think of the above ahead of the next class | There might be a reward for the best answer