Categories of controls-information security, Computer Network Security

Categories of Controls

Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the controls by category:

Control function:
Controls (safeguards) designed to defend systems are preventive or detective.

Architectural layer:
Some of the controls apply to one or more layers of organization’s technical architecture

Strategy layer: Controls classified by risk control strategy (avoidance, transference, mitigation) in which they operate.

Information security principle: Controls can be classified according to characteristics of secure information they assure. These characteristics include: accountability integrity, availability, confidentiality, authorization, authentication, and privacy.

Posted Date: 10/9/2012 2:19:16 AM | Location : United States







Related Discussions:- Categories of controls-information security, Assignment Help, Ask Question on Categories of controls-information security, Get Answer, Expert's Help, Categories of controls-information security Discussions

Write discussion on Categories of controls-information security
Your posts are moderated
Related Questions
Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

define .

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis