Contoh Soal :
In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security.
In this material :
Materi Download : 9. Law and Ethics
UU ITE Download : UNDANG-UNDANG REPUBLIK INDONESIA NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK
The eighth chapter of the text presents essential risk mitigation strategy options and opens the discussion of how to control risk.
This will include identifying risk control classification categories, using existing conceptual frameworks to evaluate risk controls, and formulating a cost benefit analysis.
Readers will learn how to maintain and perpetuate risk controls.
As a method to contrast the approach presented in the earlier parts of the chapter, the OCTAVE approach to managing risk is introduced.
Yang akan dibahas :
Materi Download : 8. Risk Management: Assessing and Controlling Risk
Define risk management and its role in the organization
Begin using risk management techniques to identify and prioritize risk factors for information assets
Assess risk based on the likelihood of adverse events and the effects on information assets when events occur
Begin to document the results of risk identification
Download Materi : 7. Risk Management: Identifying and Assessing Risk
In this chapter, readers will learn the components of the dominant information security management models, including :
There are :
Download : 6. Security Management Models and Practices