[mrti] week 04hstr yseye ersyesry
DESCRIPTION
stytys seryery seryers serybserTRANSCRIPT
Page 1
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Information assets vs.IT assets
Ref: http://www.delood.com/sites/default/files/imagecache/article-
photoslide/Where%20the%20Internet%20Lives%20Google%20D
ata%20Centre_10_delood.jpg
Page 9
Definition
Page 10
Definition
Wisdom
Knowledge
Information
Data
Rowley, J., (2007). The wisdom hierarchy: representations of the DIKW hierarchy. Journal of
Information Science. Vol 3 no 2.
Page 11
Definition
Page 12
Definition
Page 13
Definition
Page 14
o
o
o
Comprehend your own information assets
Page 15
Information Security
Page 16
The Definition
Page 17
The Purpose
http://www.praxiom.com/iso-27000-
definitions.htm#Information_security
Page 18
Information Security Areas: The CIA Triad
Page 19
Information Security Areas: The CIA Triad
Page 20
Information Security Areas: The CIA Triad
Page 21
Comprehend The CIA Triad in a Case Study
No. InformationSecurity Areas
Threat
1. Confidentiality …..
2. Confidentiality …..
3. Integrity ..…
4. .... …..
5. Integrity ……
6. …. ……
7. Availability ……
Page 22
Information Security –Related Standard
Ref: http://www.delood.com/sites/default/files/imagecache/article-
photoslide/Where%20the%20Internet%20Lives%20Google%20D
ata%20Centre_10_delood.jpg
Page 23
ISO/IEC 27001
Page 24
ISO/IEC 27001
Page 25
ISO/IEC 27002:2005 (Formerly: ISO/IEC FDIS 17799)
Page 26
ISO/IEC 27002
Page 27
o
o
Assessment Category: Group Work