latif
Uploaded by
7 SLIDES
217 VUES
70LIKES

Comprehensive Overview of Security Practices for Physical and Personnel Protection

DESCRIPTION

This course wrap-up addresses key aspects of security, focusing on physical and personnel safety within an organizational context. It delves into what security means, the importance of securing critical information, and behaviors that are permitted or prohibited. Participants learn about various protection methods, the significance of operating systems and networks, and the necessity of ongoing evaluation and monitoring. The course emphasizes that policies must be adaptable to change and human error, and that effective security requires a multifaceted approach. Ultimately, it highlights the importance of being prepared for incidents and proactive in protecting assets.

1 / 7

Télécharger la présentation

Comprehensive Overview of Security Practices for Physical and Personnel Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Course Wrapup

  2. So what have we dealt with? • Environment: Physical and Personnel Security, Mission • Policy: What is security • what is important to secure • what allowed/forbidden behavior • Methods • authenticity, privacy, integrity, availability • operating system, application, network • Evaluation • monitoring • analysis • dealing with incidents

  3. Environment • The more controlled the situation, the easier to protect critical information • The clearer the understanding of the mission, the easier to identify • critical information • methods of protection

  4. Policy • No single policy fits all organizations • Relative importance of security properties • Policy must allow for human mistakes • Policy must allow for changing conditions • Default yes vs. default no • Specify allowed/forbidden behavior on all critical assets

  5. Methods • No silver bullets • Overlapping methods • Allow for error • Allow for attack • Allow for change • Methods for identification, privacy, protection, backup, restoration

  6. Evaluation • All security will be evaluated • Planned evaluation • Unplanned evaluation • Evaluation must be in terms of mission impact

  7. Closing thoughts • Security means protecting what you have • Survivability means always having an option available to do what you need • This course has just scratched the surface

More Related