What is an Information Security Assurance?|
It is a combination of appliances,system, and solutions,software,
alarms, and vulnerability scans working together. Security is also
for PPT (People, Processes, Technology) and its achieve using
several strategies, it is also essential to protect vital processes and the systems that provide those processes. Information security is being monitored 24-7 to secure to be free from danger.Components Information Security Assurance?
People "Who we are" - This is ferers to people who used information
like management, business partners, employees, contactors, customer,
clients etc.
Process "what we do" - The processes of workflow, that repeatable
steps to accomplish business objectives. Regularly process in IT
infrastruture including helpdesk management, incident reporting
managemen, request process, third party services, IT procurement
process and many more.
Technology "What we use to improve what we do" - Something refers to
network infrastructure like cabling data, telecomunication services,
operating software for server computers, remote access services,
wireless connectivity. Application software that related to software
system services, Physical Security components like CCTV cameras,
clock in system biometrics, air conditioning, electricity power
backup. Access Devices like Desktop computers, laptops, digital
camera, printers, scanners, etc.Differentiate the certification programs to Common body language?
It is a nonverbal behaviors that compose body language. Understand through cheking personal style, facial expresions, interpret gestures, interpret eye contact, and also the body movements. Body language is design to help you understand the different aspect of body language so that you will get information advantage.
Differentiate the Governance and Risk management?
The role of the risk management is plays in governance of an organization that sets relationship of protection requirement meet by controls reduce to risk and to protect against threats and increasing the risk. Vulnerabilities expose to information asssets and having the asset values, the cycle leading to growth the risk.
Different between Security Architecture to Design?
Security architecture is a set of components and resources of a security system, considered a design that include structures and addresses the risk involve environment. While Security design refers to the methods ang strategies on managing hardware and software elements to offset security, Authentication and authorization is a example of security design.
Different between Business Continuity Planning to D-i-s-a-s-t-e-r Recovery Planning?
Business - continuity is about on proceeding the business in times of struggle and bad situation to continue the operation of a business. Business continuity planning may also take into small problems such as mild disaster, power corruptions, network lost.
Disaster Recovery - It refers to planning a recovery to resolve the business issues such as cybercrime, natural disaster, terror attacks that may affect the business. Disaster recovery may involve creating additional employee safety measures such as training drills that fucos on maintaining the operations.What is Physical Security Control ?
Physical security control is the implementation of safety measures in a facility to prevent or determined unauthorized access of information systems. Examples of physical controls are CCTV Cameras, Motion Alarm Detector, Picture /ID Scanners, Biometrics such as Finger print, voice, face that automatics recognized individuals.
What is Operations Security?
Its a security and risk management that provides protection from a cyber attack that might steal data information. Operations security incourage IT and security managers to to view the perspective of cyber attackers operations. It include activities like behavior monitoring, social media monitoring, and practices securities.
What is Law?
Information Security Law is a Law that implemented by the government to take care the data information system. Unauthorized access or hackers that disobey the policy will be imprison.
What is Ethics?
Ethics refers to the issues that faced by the company. Sometimes business ethics involved to security practices and procedures to build business plans. Monitoring risk and threats of the organization are part of the business ethics to secure the business from hackers, virus attack and common issues that might happen.
What is Information Security?
Information securty is a IT organization that helping the business assets to protect their system and information from theft and unathorized uses. Typically the hardware and software protected by equipment such as survelance cameras, biometrics, scanners and serial numbers it is also monitored 24 hours to assure the protection.