Page 38 - CISSO_Prep_ Guide
P. 38

repudiate is to deny. This can be used when a person wants to
            refute or deny participating in a transaction or claim that a
            document has been altered. In a world of e-commerce and
            electronic transactions, it is vital to establish authenticity and a
            source of electronic transactions.

            Summary of the CIA Triad
            The CIA triad is an excellent way to describe the core principles
            of information security. It expresses information security in a
            way that can be understood by and is relevant to management,
            users, and other non-security personnel.



            The Security Framework

            All through this book, we make a small error. We refer to this
            field as IT security - Information Technology security. In fact, it
            would be more accurate to use the term IS Security -
            Information Systems Security. Security is much more than just
            technology. Security is a factor in every part of the business -
            processes, information, systems, networks, users, management,
            facilities, and applications. Security is a culture, an accessibility
            that requires structure, metrics, policies, enforcement, and
            support.
            Setting up a security program starts with senior management
            support and a mandate that grants the authority for the security
            department to represent the interests of senior management in
            the establishment of policies and procedures that will address
            the security requirements management is seeking.
   33   34   35   36   37   38   39   40   41   42   43