Summary Chapter 8 Securing Informatin System
Summary Chapter 8 Securing Informatin System
Summary Chapter 8 Securing Informatin System
Ranks information risks, identifies acceptable security goals, and identifies mechanisms for
achieving these goals
Drives other policies
Identity management consists of business processes and software tools for identifying the valid users of a
system and controlling their access to system resources. It includes policies for identifying and
authorizing different categories of system users, specifying what systems or portions of systems each user
is allowed to access, and the processes and technologies for authenticating users and protecting their
identities.
DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING
Disaster recovery planning devises plans for the restoration of computing and communications services
after they have been disrupted.
Business continuity planning focuses on how the company can restore business operations after a disaster
strikes.
THE ROLE OF AUDITING
Checks computers for presence of malware and can often eliminate it as well
Requires continual updating
Unified Threat Management Systems
To help businesses reduce costs and improve manageability, security vendors have combined into a single
appliance various security tools, including firewalls, virtual private networks, intrusion detection systems,
and Web content filtering and antispam software. These comprehensive security management products
are called unified threat management (UTM) systems.
SECURING WIRELESS NETWORKS