Đang chuẩn bị liên kết để tải về tài liệu:
Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The primary remaining problemin keymanagement is a technical issue; namely how to locate the certificate for a certain machine or person. Some basic requirements on the facility used to locate the certificate can easily be identified. It must be accessible everywhere. It should be practical, in the sense that it should not be extremely expensive or cause administrative hassle, to work. Preferably it should be distributed, because a central world-wide organization to store all certificates is not feasible to implement. However the facility does not need to be secure, altough if possible, it would create additional value | Information Technology IT Security Essential Body of Knowledge EBK A Competency and Functional Framework for IT Security Workforce Development Office of Cybersecurity and Communications National Cyber Security Division September 2008 United States Department of Homeland Security Washington D.C. 20528 Table of Contents 1 Introduction.1 1.1 Overview.1 1.2 Background.2 1.3 Purpose.2 1.4 Scope.3 1.5 Review Cycle.3 1.6 Document Organization.6 2 IT Security Competency Areas.7 2.1 Data Security.7 2.2 Digital Forensics.8 2.3 Enterprise Continuity.10 2.4 Incident Management. 11 2.5 IT Security Training and Awareness.13 2.6 IT Systems Operations and Maintenance.14 2.7 Network and Telecommunications Security.16 2.8 Personnel Security.18 2.9 Physical and Environmental Security.19 2.10 Procurement. 20 2.11 Regulatory and Standards Compliance.22 2.12 Security Risk Management.23 2.13 Strategic Security Management.25 2.14 System and Application Security.26 3 IT Security Key Terms and Concepts.28 3.1 Data Security.28 3.2 Digital Forensics.29 3.3 Enterprise Continuity . 29 3.4 Incident Management.30 3.5 IT Security Training and Awareness.30 3.6 IT Systems Operations and Maintenance.31 3.7 Network and Telecommunications Security.32 3.8 Personnel Security.33 3.9 Physical and Environmental Security.33 3.10 Procurement.34 3.11 Regulatory and Standards Compliance.35 3.12 Security Risk Management.36 3.13 Strategic Security Management.36 3.14 System and Application Security.37 4 IT Security Roles Competencies and Functional Perspectives.39 4.1 Chief Information Officer.39 4.2 Digital Forensics Professional.39 4.3 Information Security Officer.40 4.4 IT Security Compliance Officer . 40 4.5 IT Security Engineer. 41 September 2008 - Final v1.3 ii 4.6 IT Security Professional.42 4.7 IT Systems Operations and Maintenance Professional.42 4.8 Physical Security Professional.43 4.9 Privacy Professional.43 4.10 Procurement Professional.44 5 The IT Security Role Competency and Functional Matrix.45 .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.