SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………
Words: 17808 - Pages: 72
* User Domain - defines the people who access the organization’s information system. * User Accountability – the most important measure to be taken in this domain is to make sure that the users are well trained and are aware of the risks that are out there. * Workstation Domain - Any device that users use to connect to your network. * Viruses or malware – to keep viruses and malware at bay it is best to use workstation antivirus software frequently and definitely keep this software up
Words: 299 - Pages: 2
Material Appendix B Information Security Policy Student Name: Ronald Stride University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Scott Smith Date: January 27, 2013 Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical
Words: 2332 - Pages: 10
Which technology of the following supports the convergence of voice, video, and data communication streams across a split channel? Answer PBX phone system Time Division Multiplexing Direct inward system access (DISA) Trunk access group restriction (TAGR) 2.5 points Question 2 Session Initiation Protocol (SIP) supports which of the following? Answer Presence/availability Videoconferencing Collaboration All of the above 2.5 points Question 3
Words: 1036 - Pages: 5
fax documents from the network. The print device is the hardware that produces hard copy documents on paper. Print services enable to share printers on a network. It also enables to migrate print servers and deploy printer connections using group policy. The print server is a computer device that receives print jobs from clients and sends them to print devices that are connected locally. Networks allow a printer connected to one computer to be shared with another computer on a local network. This
Words: 661 - Pages: 3
SECURITY ESSENTIALS IMPACT OF SECURITY BREACHES • Security breaches affect organizations in a variety of ways. They often result in the following: • Loss of revenue • Damage to the reputation of the organization • Loss or compromise of data • Interruption of business processes • Damage to customer confidence • Damage to investor confidence • Legal Consequences -- In many states/countries, legal consequences are associated
Words: 6837 - Pages: 28
16 May 2011 Standards and Legal Issues By Thomas Groshong An audit of the Electronic Health Record (EHR) system reveals a lack of basic policies and standards to protect EHR data from misuse, abuse or theft. The He a l t h I n s u r a n c e P o r t a b i l i t y a n d Accountability Act (HIPAA) require protection of EHR data and basic security guidance to adequately safeguard this data from threats of misuse and/or t h e f t . T h o m a s J . S m e d i n g h o f f q u o t e s H P A A l a
Words: 1128 - Pages: 5
permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit. | | Definition False | | | Term Subdomains in a tree inherit permissions and policies from their parent domains. | | Definition False | | | Term You can drag and drop leaf objects, such as users and computers, between OUs, but not between domains. | | Definition TRUE | | | Term Unlike organizational units, you cannot assign Group Policy settings
Words: 1908 - Pages: 8
Human Resources Risk Mitigation: Objective • Human resources policies and practices should reduce the human risk factors in information technology (IT) security and information access controls. Decrease the risk of theft, fraud or misuse of information facilities by employees, contractors and third-party users. Scope • the organization’s human resources policies, taken as a whole, should extend to all the persons within and external to the organization that do (or may) use information or information
Words: 1365 - Pages: 6
Multi-Layered Security Plan (MSP) With the ever-increasing access to the internet, and all the ways that information can be exploited, it is imperative that the integrity of company/corporate data/information receive the utmost attention in its protection. That responsibility rests in the hands of capable and competent Internet Technology (IT) professionals, who stay abreast of emerging technologies, to be able to make recommendations to upper management. The sophistication and organization of
Words: 796 - Pages: 4