Page 38 - CISSO_Prep_ Guide
P. 38
repudiate is to deny. This can be used when a person wants to
refute or deny participating in a transaction or claim that a
document has been altered. In a world of e-commerce and
electronic transactions, it is vital to establish authenticity and a
source of electronic transactions.
Summary of the CIA Triad
The CIA triad is an excellent way to describe the core principles
of information security. It expresses information security in a
way that can be understood by and is relevant to management,
users, and other non-security personnel.
The Security Framework
All through this book, we make a small error. We refer to this
field as IT security - Information Technology security. In fact, it
would be more accurate to use the term IS Security -
Information Systems Security. Security is much more than just
technology. Security is a factor in every part of the business -
processes, information, systems, networks, users, management,
facilities, and applications. Security is a culture, an accessibility
that requires structure, metrics, policies, enforcement, and
support.
Setting up a security program starts with senior management
support and a mandate that grants the authority for the security
department to represent the interests of senior management in
the establishment of policies and procedures that will address
the security requirements management is seeking.