Information Security and Risk Management
Information Security and Risk Management
JBP
-
\ .'
•v;
i } i it
'-' V
n
'•
i
V-,
!S
nformation Security
:
v;;
b
and
HttRisk Management i.
,u
I® (Sj
L lu
%
:.'*ÿ -.
IP SMB!
wmn
From the CISSP® CBK®, the definition of this domain—Information Security & Risk Management entails the identifica¬
tion of an organization’s information assets and the development, documentation, and implementation of policies, stan¬
dards, procedures and guidelines that ensure confidentiality, integrity and availability. Management tools such as data
classification, risk assessment, and risk analysis are used to identify the threats, classify assets, and to rate their vul¬
nerabilities so that effective security controls can be implemented.
Risk management is the identification, measurement, control, and minimization of loss associated with uncertain
events or risks. It includes overall security review, risk analysis; selection and evaluation of safeguards, cost benefit
analysis, management decision, safeguard implementation, and effectiveness review.
The candidate will be expected to understand the planning, organization, and roles of individuals in identifying and
securing an organization’s information assets; the development and use of policies stating management views and
position on particular topics and the use of guidelines, standards, and procedures to support the policies; security
awareness training to make aware of the importance of information security, its significance, and the specific secu¬
rity-related requirements relative to their position; the importance of confidentiality, proprietary and private informa¬
tion; employment agreements; employee hiring and termination practices; and risk management practices and tools to
identify, rate, and reduce the risk to specific resources.
i
; Domain Objectives—This slide provides good insight to
DOMAIN OBJECTIVES what the CISSP candidate should understand and be able to
do at the end of this domain.
V/
i J
0
Governance Structure
Policies
— Guidelines
J. 8
Standards
8
Procedures
° Introduction—Information security management includes
many areas. It begins with a formal governance structure
0
Baselines
which provides authority and responsibility to different staff 9
Guidelines
members and sections. It also includes an overarching secu¬
rity policy that is endorsed/signed by senior management.
3
Principles and Requirements—Address the core objectives
DOMAIN AGENDA
of an information security program. Here are the main learn¬
ing points you should get from this section:
0 Principles and Requirements 8
Describe the two types of requirements for a good secu¬
rity solution.
3 Policy
0
Understand and explain the major concepts of IT Security
0 Organizational Roles and Responsibilities Governance.
® Risk Management and Analysis • Understand and be able to explain differences between key
international IT security standards.
Ethics
8
Understand the types of security blueprints and how they
support a strong security policy.
3
Each type of organization has differing security
ORGANIZATIONAL & BUSINESS requirements—Information security requirements differ
REQUIREMENTS greatly between government, military, and commercial ventures.
Each has a different set of priorities depending on their overall
8 Focus on the mission of the mission. Even in the commercial world, it’s very unlikely that
two businesses will have exactly the same security require¬
organization
ments. Businesses within the same type of industry may not
8 Each type of organization have similar requirements since their business flows and
information access requirements may be very different.
has differing security
Furthermore, their company culture may limit or dictate what
requirements is, or is not acceptable. All these and many other considera¬
0 Security must make tions weigh into the selection of security controls and assur¬
ance mechanisms.
sense and be cost
effective 0
Security must make sense and be cost effective—Security
solutions must be developed with due consideration of the
mission and environment of the business.-Hisk analysis,
determining the value of information systems anffassets, and
0
Focus on the mission of the organization—IT Security
cggt-benefit analysis will justify the adoption and implementa-
must focus on and address the requirements of the organiza¬ tiwfoTlecurity controls and risk mitigation efforts.
tion’s mission, goals, and objectives.
*
and the risks these connections bring. This quick look at the 27001:2005.
requirements for IT security professionals indicates that it
certainly takes a strong, confident, and technically proficient
professional to accomplish this job.
0 Policy
8
Understand the purpose and differences of guidelines,
policies, procedures, baselines and standards.
® Organizational Roles and Responsibilities
* Describe the environment within which the security
• Risk Management and Analysis policy exists.
•Ethics
II
POLICY OVERVIEW —
Policy Overview Standards, baselines, procedures, and
guidelines will be discussed in the next few slides.
(CONT. . .)
..
Dverarching Organizational Policy
(Management’s Security Statement)
I
Standards Guidelines
Baselines Procedures
13
situations and protects the company and employees from security policy anticipates situations and provides guidance
'surprises’ caused by lack of awareness of management to protect the organization. It should establish provisions for
expectations or ethical guidelines. resolving conflicts between competing interests or people
wondering what is, or is not, permitted.
«
out the enterprise. For instance, a specific anti-virus product or
0 Adoption of common password generation token that has been chosen for use
hardware and software throughout the organization. This often reduces cost of owner¬
mechanisms and ship by allowing for large blank purchase agreements with ven¬
dors and allows for standardized training further reducing
products costs. Standards can also be guidelines created by govern¬
<
ment, industrial or other organizations that have been formally
adopted as a standard.
Desktop
8
Standards are essential so that a common basis can be
Firewall
established and implemented. Having a common basis for the
Anti-Virus overall organization is better than having each individual
department operating under their own separate (and in some
cases non-compliant) environment. This helps reduce the
19 seams that can develop between sections, departments, and
subordinate organizations. However, it’s also useful to note
that if a vulnerability to the selected target is exploited by a
j
A threat agent, the entire organization is at risk. This needs to
be considered by the security designers when designing the
network and build in places to control this risk.
:
§
—
*ÿ
mendations of the ISO 17799 guideline” just made ISO 17799
ITIL mandatory within that organization.
8
Guidelines are often used to help provide structure to a secu¬
rity program, to outline recommendations for procurement
25 and deployment of acceptable products and systems. |
0
Three levels of Security Planning—Security planning is
LEVELS OF SECURITY
conducted at the three levels.
PLANNING 0
Strategic Planning—Focuses on the high-level, long-
range requirements of the organization and are part of
3 Three levels of Security the company’s long-term plan. Examples of this are
Planning r our overarching security policy.
— Strategic Planning A
m 5
Tactical Level Planning—Are more mid-term and
V'.. focus on events that will affect the entire organization.
— Tactical Level Planning :
i
Many of our functional plans fit into this category.
%
— Operational Planning •77.:/- 0
Operational Planning—Focuses on “fighting fires” at
3 These plans must be integrated the keyboard level. This is planning for the near-term
that directly affects the ability of the organization to
19 Seamless transition between levels accomplish its Objectives.
23 J
These plans must be integrated—Plans and actions from all
three levels must work together. That occurs with detailed
planning.
8 Seamless transition between levels—Actions must seam¬
lessly transition between the different levels.
Organizational Roles and Responsibilities 9 Explain the importance of personnel security to a good
IT security program.
O
Risk Management and Analysis
9
Be able to explain key considerations of a good per¬
•Ethics sonnel security program.
24
• Email security
9
Violation report review
35 9
Awareness training
8
Information Systems Auditor—The information systems
ORGANIZATIONAL ROLES auditor plays a key role in the assurance of our networks and
AND RESPONSIBILITIES our security programs. They provide independent assurance
that the right controls and being used in the right manner, for
•Information Systems Auditor the right purpose, and if they are having the desired outcome.
3$ 0
employees including following-up with references, verifying
educational records, etc.
Sign Employment Agreements—Non-disclosure agree¬
ments; business ethics, including telephone and Internet
i'y- acceptable usage policies, etc., should be a part of the hiring
process and must begin with security awareness training on
the first day of employment. This should include having
them read appropriate policies and procedures and sign
NDAs and acceptable use policies. Care must be taken to
ensure that this doesn’t become so difficult or time consum¬
ing that management finds ways to get around the policy.
0
Cover points such as keys, ID card, passwords,
PERSONNEL SECURITY
equipment loaned out to employee (laptops, cell
phones, pagers).
•Low Level Checks
° Termination Procedures—Termination and disciplinary
•Consult the Human Resources actions are always difficult for everyone involved. Managers
(H.R.) department often feel sympathy for the individuals and sometimes make
i
decisions that place our information and assets at unneces- i1
•Termination Procedures sary risk. Therefore, all termination and disciplinary actions .v
must be pre-coordinated within a confidential circle that
includes the H.R. and IT security personnel. When a termina-
tion is occurring, the individual’s access to the network,
information, and assets must be stopped. This is best done
by the IT security personnel while the individual is being
informed of the action. However, one must be careful to
29 follow local laws in these matters.
• The only way to ensure that all company property is
0
Low Level Checks—If someone comes in at a low-level job returned is to keep an accurate inventory of all equipment
then subsequently moves to a higher level position, there should given to a user—remote access tokens, keys, ID cards,
be further checks done. The appropriateness of background cell-phones, pagers, credit cards, laptops, software, etc.
checks may have to follow legal statutes, i.e., Privacy laws, etc. This makes it easy to account for these assets and recover
them upon termination.
0
Consult the Human Resources (H.R.) department—To
'•
\ protect management and the company, all personnel actions ° An Individual’s access to the network should be sus¬
should be processed through the H.R. department using pended during all periods of suspension from duties and
\r established procedures. A single manager should not be considered when serious disciplinary actions are pending.
7: allowed to control the process to avoid possible security Individuals faced with these situations often feel trapped
* concerns. Procedures should: and lash-out at the company using their access to the net¬
work as the only weapon with which to fight back.
0
Include approved company standard checklists for hir¬ Suspension/disciplinary procedures can often create secu¬
ing interviews. rity concerns similar to termination—procedures should
address these risks/concerns.
j ° Job Rotation 3
Least Privilege/Need to Know—The principle of least privi¬
lege and the requirement for need to know should always be
0 Mandatory Vacations executed to minimize access to information and assets.
|
0
Separation of Duties—Forces collusion in order to manipu¬
late the system for unauthorized purposes.
3i ° Job Rotation—(When possible) Breaks up collusion and pro¬
i vides opportunities to review authorizations and actions taken
by the individual. If our other security measures have failed,
4w. \IA .Vu&v'X $ r>' this gives us an opportunity to find the breach in security
before it gets worse or goes on excessively long. Job rotation
also provides trained backups.
0
Mandatory Vacations—Much like job rotation, mandatory
vacations provide the opportunity to detect fraud. Also, when
people are on vacation, their access to the site should sus¬
pended. This prevents working from home (possibly covering
their tracks) and provides the much needed vacation they
have earned.
32 0
Media handling responsibilities
9
Incident reporting
Security Awareness, Training and Education—These are three
different concepts applying to the development of staff. 9
Social engineering
Awareness programs start from the first day of employment
and address the requirements of policy, social engineering, and • These topics lend themselves to a variety of •
•'>
i Jj
>
c
\
34
•n
0
Risk Management Concept Flow—This overview shows
RISK MANAGEMENT
the relationships among the key components. Threats,
CONCEPT FLOW Vulnerabilities, and Asset values are used to identify the over¬
all risk to an organization’s assets. The understanding of this
slide is important and demonstrates several concepts related
wish to minimize
to Risk and Countermeasures. One key point is the recogni¬
i impose
tion that safeguards may also contain new vulnerabilities that
Lj Safeguards
that may the information security professional must be aware of.
possess
[hatmay i
reduced byj
may be aware of
that
>mm. leading to
| give rise to
that Rtefc
.
u
wish to 1
1f-drth- \s
11 36
1
tj\y
X- \
\
1
•Risk 9
Countermeasures and Safeguards—Are those measures
0 Residual Risk and actions that are taken to try and protect systems. They
could be one of several types of controls which we will talk
about later.
9
Risk—Is a “likelihood” or probability that some unwanted
event could occur. Possibility that a particular threat will
adversely impact an information system by exploiting a par¬
• Vulnerability—Is any weakness that could be exploited. ticular vulnerability.
Vulnerabilities exist in every IT system, product and applica¬
tion. A security program will address vulnerabilities by imple¬ Several times throughout this course we will say
menting safeguards or countermeasures to prevent the that we cannot reduce risk to zero. The next term
exploitation of a vulnerability, however the security person answers that issue.
must always be aware of the risk of new vulnerabilities and the 8
Residual Risk—Is the amount of risk remaining after coun¬
inability to completely remove all vulnerabilities from a system.
termeasures and safeguards are applied.
j /J L J it, A
C1 \
JO
r :s*
L
s ;
39 „ £
- x.
\v b /- Aÿ lh
.c 7
40
/ r •
A r.~i -
0*
u
,a‘
•(-: \.C-L
; RISK FACTORS A/'-1 *)
.1,
>5
u V
W5
!
Threats
"
17-
1
Assets &
t t
ijb 0 l>
§
(-
_
L
Vulnerabilities
s
I 41
Threats l!
Assets
m
°Q mi
X wmm
%
%
43
43
I
analysis should remain focused on the objectives set, on “what
PURPOSE OF RISK ANALYSIS does this mean to the company” and “what is the value of this
to the company?”
•Identifies and justifies risk
mitigation efforts mm Identifies and justifies risk mitigation efforts—
• Identifies the threats to business processes and infor¬
9
Describes current security mation systems.
posture
° Justifies the implementation of specific countermea¬
•Conducted based on risk to sures to mitigate risk.
the organization’s objectives/mission 0
Describes current security posture—Risk analysis helps us
explain the current security posture to management in terms
they understand.
Conducted based on risk to the organization’s objectives/
J
44 ‘ mission—Risk analysis is much more than just a risk to the
IT Systems. It is primarily concerned with the inability of the
7 Purpose of Risk Analysis—A good risk analysis should pro¬ organization to accomplish its business mission.
vide data to explain the company's risk environment to
management in terms they understand. The process of risk
A k' Tj J- kx}>
J (ISC)3 — INFORMATION SECURITY AND RISK MANAGEMENT 35
BENEFITS OF RISK ANALYSIS • Identifies areas with specific requirements—Some areas
under the influence of specific regulations include financial
sections, those involved with stock, privacy, and often health¬
® Focuses policy and resources care (in some countries this is covered by the privacy laws).
You will need to determine if any of these apply before begin¬
® Identifies areas with specific risk requirements ning your risk analysis. As we discussed earlier, this should be
•Part of good IT Governance part of identifying the environment that your company oper¬
ates in and a routine part of your IT Governance program.
® Supports
With limited personnel, budgets and tools, risk
— Business continuity process analysis ensures that the resources of the organization
are targeted at the areas of greatest risk and in the
— Insurance and liability decisions ; meantime making sure that there are no gaps in the
security process.
— Legitimizes security awareness programs
• Part of good IT Governance—Risk analysis is a key part of
45 good IT Governance.
Focuses policy and resources—Risk Analysis ensures that Sometimes, security professionals can get compla¬
the resources and policy of an organization are directed cent if they have not had an incident for a period of
appropriately. Risk analysis is not a cookie-cutter approach— time. This “sunny day period” can be dangerous as
professionals start to relax. Many have said that a
it requires an in-depth look at the organization as a whole and
at each functional area. Risk is different from one area to fresh risk analysis project sharpens their skills and
another and risk analysis and management must reflect those generates new-found excitement for their work.
differences. Functional experts from each area should be part
of the process to help assess value and impacts to the com¬
• Supports—A risk analysis effort also supports many other
associated activities, such as the business continuity plan¬
pany. After all, they should know their area better than any¬
ning project and business impact analysis; it provides infor¬
one else.
mation for corporate insurance premium calculation and
lends legitimacy to security awareness programs.
0
Risk Assessment must also address emerging
EMERGING THREATS FACTOR threats—
ti !~'if E Ic-' 9
Operations—Operations personnel will often become aware
of incidents through job errors, systems failures, and unex¬
i plained changes in systems performance that may indicate an
ongoing threat.
)
0
Facility Records—Will often contain valuable information
about the trends and performance of the system that can be
used to observe repeated errors or unresolved problems.
\
9
Community and Government Records—May alert to possible
weather or other environmental (human) conditions that
could affect the secure operation of the organization.
!
0
Vendor/Security Provider Alerts—Professional organizations
and mailing lists should be monitored to become aware of
new threats or vulnerabilities.
Other types of threats that could be considered:
fib
% , S* A
!i
\
A bo \ h js>
A
RISK ANALYSIS TYPES • Two Types of Risk Analysis—There are benefits and draw¬
backs to each type of risk analysis. Most organizations will
use a combination of the two in order to get a more complete
0
Two types of Risk Analysis picture of their risk.
— Quantitative Risk Analysis
— Qualitative Risk Analysis
® Both provide unique capabilities
t 0/
0
Both are often required to get
a full picture
5i
0
Quantitative Analysis Steps—Three steps of a quantitative
QUANTITATIVE ANALYSIS
risk analysis process. These slides are very important to fully
STEPS understand and study as they form a very important part of
information security risk management.
•Three primary steps
1. Estimate potential losses
2. Conduct a threat analysis r
0-
53
56
7''
—
QUANTITATIVE RISK —
Quantitative Risk Analysis Step Three—This formula is very
important as it uses the ARO and SLE information to provide
ANALYSIS-STEP THREE us the ALE. Understanding ALE, cost/benefit analysis and quan¬
titative risk analysis is important to ensure that the security
3 Determine Annual Loss Expectancy (ALE) professional can obtain the support from senior management
; and users for security solutions and risk mitigation efforts.
•Combine potential loss and rate/year • The ALE provides an estimated amount of damage (in mone¬
I 9 Magnitude of risk = Annual Loss Expectancy tary terms) the organization can be expected to lose per year
due to a risk. It indicates, therefore, how much the organiza¬
//•Purpose of ALE tion is justified in spending on countermeasures to reduce
the likelihood or impact of an incident. A direct correlation
— Justify security countermeasures should be shown between the amount spent on security and
the amount of benefit realized through the reduction in risk.
ALE = SLE * ARO
au-A, ne'e 57
L-
QUALITATIVE RISK 9
Scenario Oriented—Qualitative risk analysis is scenario
oriented. Instead of applying monetary values, as done with
ANALYSIS-SECOND TYPE quantitative risk analysis, it evaluates the impact or effect of
threats on the business process or the goals of the organization.
i 9 Scenario Oriented
j — Does not attempt to [ I * Does not attempt to assign absolute numeric values
to risk components—Each threat is described in a
assign absolute threat scenario and the expected impact from that threat
I '
numeric values to is graded on a scale that indicates the severity of that
threat. Each risk is ranked per department according to
risk components
the effect of that risk on their business functions. The
| 9 Purely qualitative risk cumulative, weighted ranking of the risk across all
analysis is possible departments then indicates the severity of the total risk.
;
0
Purely qualitative risk analysis is possible—It is possible
I. to conduct a PURE qualitative risk analysis because the
impact on the assets is evaluated by a weighted ranking
instead of absolute dollar values.
Qualitative Risk Analysis—Second Type—The second method
of risk assessment is a “qualitative risk analysis.”
Likelihood:
Each risk is weighed both from the aspect of .impact
(consequence) with a rating of 1-5; and likelihood
B(Kktlj) with a rating from almost certain to rare. It is
C(po*Ms) U placed on the table according to its calculated risk
level..Those risks that fall into the extreme risk cat¬
B(nuo) egory are the first risks that should be addressed in
HHHGnaui Ritlc Immediate aeden retried t o m>h|ate die nik or decide Is not proceed the risk mitigation effort.
_
Hitil Ride Action thouldbe taken to compensate Tortile risk
IA- 9ÿ 4- £
t, x iJ- )
J
<A £7
r y f
.
|; V 0° I®
Aÿ
/jj -
)/\s. o
C
— Create a “tree” of all possible threats to, • ‘Branches’ are general categories such as network
or faults of the system threats, physical threats, component failures, etc.
61 • Prune ‘branches’ that do not apply.
Other Risk Analysis Methods—Failure modes and effects • Concentrate on remaining threats. v
analysis are often used in determining risk analysis of failures
in hardware. However, it is also applicable for other methods of * Fault tree analysis is straight forward and can be used by
risk analysis. itself or with other processes to avoid 'group think’ and
blind spots. The process normally starts with an effort to
• Failure Modes and Effects Analysis— “brainstorm” every possible threat. The threats that do not
apply are eliminated (or pruned) and analysis is conducted
0
Examine potential failures of each part or module. on the remaining branches. /
9
Isa cost decision often based on the cost required
RISK MITIGATION OPTIONS to reduce the risk when compared to the potential
! loss and the likelihood.
•Risk Acceptance • Is a pain decision often based on the tolerance of man¬
•Risk Reduction : agement to adverse events—For example how many
i;
; times would a businesses allow someone to deface
9 Risk Transference their web server if it is not core to the business
3 Risk Avoidance . n :
®
processes before it implements a more costly solution.
Is a visibility decision often based on the value of
the company’s reputation.
* Resulting Risk
63 * Countermeasures
The Right Amount of Security—Is based on several factors. 9
Risk tolerance (what is the risk appetite of our
Remember that all these items go into the thought process organization)
related to selecting the proper countermeasures to address
risk. It is not recommended to spend more to protect an asset
than it is worth. Additionally, budgets are frequently insuffi¬
cient. Therefore, hard decisions should be made on how to
protect the most valuable assets in the manner discussed in
the last slide.
SELECTION PRINCIPLES 3
Avoids asset destruction and stops further damage. I
(CONT. . .) 9
Prevents disclosure of sensitive information through a
covert channel.
a
# 0
Reaction and Recovery 3
Maintains confidence in system security.
Q
Override and Fail-safe Defaults 3
Captures information related to the attack and attacker.
•Residuals and Reset 1
3
—
Override and Fail-safe Defaults In the event of a sus-
pectedjncident, the countermeasure should defaultto'"no
0 access’’ or presWelh¥ÿvstermmTÿcurrstate71n order to
preventTdeniaTofservice, there should be a way to disable
Li.* or override the control.
r 3
67 0
Residuals and Reset—During the recovery fromjm incident.
the countermeasure must be protected-fromiurtherÿ attacks
Reaction and Recovery—Is the ability of the countermeasure whilefbeing'reset it-must retunftb a secure condition and
to detect and react to an incident and capture the relevant
information related to the incident.
protect logs from destruction.- - —
I
DOMAIN AGENDA
3
Ethics—One of the most important areas for management
and CISSPs is that of sound ethical behavior. You will be
required to sign the (ISC)2 Code of Ethics before you can take
•Principles and Requirements the exam and become a CISSP. It’s essential that you under¬
stand it and can apply it to real-world situations. This section
•Policy will discuss ethics.
® Organizational Roles and Responsibilities
• Here are the objectives of this section:
® Risk Management and Analysis • Understand the ethical responsibilities of user groups
3
Ethics within the organization.
0
Understand the (ISC)2 codes of ethics for CISSPs and
how to abide by them.
0
Understand the ethical guidelines for proper usage of
68 the Internet.
3
CISSPs “set the example”—CISSPs not only know where
ETHICAL RESPONSIBILITIES
the ethical boundaries are, but also must set the example for
others to follow. This often means making hard decisions and
1
©
CISSPs “set the example” demonstrating strong ethical principals in their daily activi¬
ties. (ISC)2 has provided good ethical guidelines to provide
3 CISSPs encourage direction, and the security professional should adopt them
adoption of ethical and encourage others to do the same. Awareness training is
guidelines and standards a great place to conduct initial ethics training and refresher
j training for users.
0
CISSPs inform users
through security
0
CISSPs encourage adoption of ethical guidelines and
awareness training standards—Through the creation of statements of ethics,
especially in relation to ethical use of internet access, email,
and other computer systems.
-1 3
CISSPs inform users through security awareness
J training—About ethical responsibilities.
m
good/interest
FORMAL ETHICAL THEORIES Formal Ethical Theories—There are formal ethical theories
beyond mere tradition or law. Most of these theories fall into
one of two categories.
® Teleology
3
Teleology—Teleological theories and approaches are based
— Ethics in terms of goals, on outcomes. They try to provide the greatest good for the
purposes, or ends gÿp* greatest number of individuals.
y
• Many religions are deontological in their teachings.
71
codes of ethics
Internet Activities Board (IAB)
77-Ji
Auditors - s
)
73
1 r d t/—
r &*•****¥
74
' C c- P A — *1
... £ * <$ . .
j 3
(ISC)2 Code of Ethics Canons—These canons are expressed
(ISC)2 CODE OF ETHICS
in the priority that they should be followed. Sometimes it
CANONS becomes impossible to apply all of the canons as they may
J conflict in a particular situation. Therefore, we must remem¬
° “Protect society, the commonwealth, and the ber that these are in the order that we should apply them to
j infrastructure" work through difficult ethical challenges.
© “Act honorably, honestly, justly, responsibly, and
legally”
0 “Provide diligent and competent service to
principals”
0 “Advance and protect the profession”
75
J
9
,J
76
3
Internet Activities Board (IAB)—Has provided this list of
INTERNET ACTIVITIES unethical and unacceptable practices. These are self-explanatory
BOARD (IAB) and worth your understanding.
11
INTERNET ACTIVITIES
BOARD (IAB)
78
1 • Handbooks, guides.
• Training.
• Reviews
DOMAIN SUMMARY
J — Ethics «T
lWe M
t
(ISC)3 — INFORMATION SECURITY AND RISK MANAGEMENT 5i
,
im
W§.I V
n n
i:
mm
jjnfhf
i.
;
L
A k mm .
- --
-".ji'V
•-ÿ
.
Emi m
I' T-
--- ,
-
I
m
-,rj««w”
SSIBi |
m 3
mm ,
!
Si*
Ife
•
.
*
..
:.-V?
:: U
in ::
mz .
!
ll
r M—
fetSl
-•ÿ
i
mm
i m mm
Review Questions
|1. Which of the following is not a functional policy example 7. Which one of the following is not a primary step in
1
covered in this domain? Quantitative risk analysis?
jr. Data Classification
’
-
0 b - it
t-