OSR/Aug 02 Data Security E2002, Lecture 1 August 30, History Background - Batch - Remote access, DB, RACF - Orange Book - ITSec, Common Criteria - Code of Practice - BS 7799, ISO ISO TR DS 484
OSR/Aug 02
What is Information Security ? Why do we need Information Security ? - Commercial Image - Loss of Reputation, Trust, Confidence Examples
OSR/Aug 02
Trust
Security Requirements - Risk Assessment ¤ Exercise: Five most serious threats ¤ KPMG Security Survey ¤ Traffic Light Analysis ¤ Risk Model ¤ Vulnerability Analysis Threats – BSI List - Legal Requirements ¤ FSR Vejl ¤ SysTrust - Good Practice
OSR/Aug 02
Exercise Which are the five most serious IT- security threats to an organization ?
OSR/Aug 02
Risk model Vulnerability Impact Threat
OSR/Aug 02 Legal, statutory, regulatory and contractual requirements
OSR/Aug 02
Principles and objectives Vision Ethical Good Practice IT Security Policy
OSR/Aug Controls - Preventive - Detective - Corrective Critical Success Factors - Examples
OSR/Aug 02
Trafiklysanalyse
OSR/Aug 02