[mrti] week 04hstr yseye ersyesry
DESCRIPTION
stytys seryery seryers serybserTRANSCRIPT
![Page 1: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/1.jpg)
Page 1
![Page 2: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/2.jpg)
![Page 3: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/3.jpg)
Page 3
![Page 4: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/4.jpg)
Page 4
![Page 5: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/5.jpg)
Page 5
![Page 6: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/6.jpg)
Page 6
![Page 7: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/7.jpg)
Page 7
![Page 8: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/8.jpg)
Page 8
Information assets vs.IT assets
Ref: http://www.delood.com/sites/default/files/imagecache/article-
photoslide/Where%20the%20Internet%20Lives%20Google%20D
ata%20Centre_10_delood.jpg
![Page 9: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/9.jpg)
Page 9
Definition
![Page 10: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/10.jpg)
Page 10
Definition
Wisdom
Knowledge
Information
Data
Rowley, J., (2007). The wisdom hierarchy: representations of the DIKW hierarchy. Journal of
Information Science. Vol 3 no 2.
![Page 11: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/11.jpg)
Page 11
Definition
![Page 12: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/12.jpg)
Page 12
Definition
![Page 13: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/13.jpg)
Page 13
Definition
![Page 14: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/14.jpg)
Page 14
o
o
o
Comprehend your own information assets
![Page 15: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/15.jpg)
Page 15
Information Security
![Page 16: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/16.jpg)
Page 16
The Definition
![Page 17: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/17.jpg)
Page 17
The Purpose
http://www.praxiom.com/iso-27000-
definitions.htm#Information_security
![Page 18: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/18.jpg)
Page 18
Information Security Areas: The CIA Triad
![Page 19: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/19.jpg)
Page 19
Information Security Areas: The CIA Triad
![Page 20: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/20.jpg)
Page 20
Information Security Areas: The CIA Triad
![Page 21: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/21.jpg)
Page 21
Comprehend The CIA Triad in a Case Study
No. InformationSecurity Areas
Threat
1. Confidentiality …..
2. Confidentiality …..
3. Integrity ..…
4. .... …..
5. Integrity ……
6. …. ……
7. Availability ……
![Page 22: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/22.jpg)
Page 22
Information Security –Related Standard
Ref: http://www.delood.com/sites/default/files/imagecache/article-
photoslide/Where%20the%20Internet%20Lives%20Google%20D
ata%20Centre_10_delood.jpg
![Page 23: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/23.jpg)
Page 23
ISO/IEC 27001
![Page 24: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/24.jpg)
Page 24
ISO/IEC 27001
![Page 25: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/25.jpg)
Page 25
ISO/IEC 27002:2005 (Formerly: ISO/IEC FDIS 17799)
![Page 26: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/26.jpg)
Page 26
ISO/IEC 27002
![Page 27: [Mrti] Week 04hstr yseye ersyesry](https://reader034.vdocuments.net/reader034/viewer/2022051820/55cf8f58550346703b9b65fa/html5/thumbnails/27.jpg)
Page 27
o
o
Assessment Category: Group Work