The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by sariah.rajuli, 2023-01-03 00:52:20

CLO 2 Protect organizational data

CLO 2 Protect organizational data

CLO 2 : ANALYZE THE FUNCTIONALITY OF IT SYSTEM
TO PROTECT ORGANIZATIONAL DATA

VIEWING AND PROTECTING ORGANIZATIONAL I N F O R M AT I O N DATA

Information
Security



Line of Defense

• Organizations address security risks
through two lines of defense; the first
is people, the second technology.

• Information security policies identify
the rules required to maintain
information security.



The Second Line of Defense—Technology

Authentication is a method for confirming users’ identities.
Once a system determines the authentication of a user, it can
then determine the access privileges (or authorization) for that
user.
Authorization is the process of providing a user with
permission including access levels and abilities such as file
access, hours of access, and amount of allocated storage space.

Authentication and authorization techniques fall into three categories; the most secure procedures
combine all three:

1. Something the user knows, such as a user ID and password.
2. Something the user has, such as a smart card or token.
3. Something that is part of the user, such as a fingerprint or voice signature.

The Second Line of Defense—Technology

Prevention and resistance technologies stop intruders from accessing
and reading data by means of content filtering, encryption, and
firewalls.

Organizations can use content filtering technologies to filter
email and prevent emails containing sensitive information from
transmitting.
It can also filter emails and prevent any suspicious files from
transmitting such as potential virus-infected files. Email content
A firewall is hardware and/or software that filtering can also filter for spam, a form of unwelcome email.
guards a private network by analyzing incoming Encryption scrambles information into an alternative form that
and outgoing information for the correct requires a key or password to decrypt. If there were a security
markings. If they are missing, the firewall breach and the stolen information were encrypted, the thief
prevents the information from entering the would be unable to read it.
network. Firewalls can even detect computers
communicating with the Internet without
approval.

The Second Line of Defense—Technology

ATTACK: DETECTION AND RESPONSE

With so many intruders planning computer attacks, it is critical that all
computer systems are protected.

The presence of an intruder can be detected by watching for suspicious
network events such as bad passwords, the removal of highly classified
data files, or unauthorized user attempts.

After identifying an attack, an MIS department can implement response tactics to mitigate the
damage.

Response tactics outline procedures such as how long a system under attack will remain plugged in
and connected to the corporate network, when to shut down a compromised system, and how
quickly a backup system will be up and running.


Click to View FlipBook Version