Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business
|
|
|
- Darcy Copeland
- 10 years ago
- Views:
Transcription
1 Qualification Specification Level 4 Certificate in Cyber Security and Intrusion For Business ProQual 2015
2 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment 5 Internal quality assurance 5 Adjustments to assessment 5 Results enquiries and appeals 6 Certification 6 Learning Outcomes and Assessment Criteria 7 2
3 Introduction This qualification builds on the fundamental principles of cyber security and is a natural progression for individuals working in an IT role, helping them to qualify as cyber security professionals. The qualification also provides a clear route of progression for individuals seeking to move from IT support roles, into better paid and more testing cyber security positions. The awarding organisation for this qualification is ProQual Awarding Body and the regulatory body is the Office of Qualifications and Examinations Regulation (Ofqual). The specification for these qualifications has been approved by the Welsh Government for use by centres in Wales. Entry Requirements There are no formal entry requirements for this qualification. Centres should carry out an initial assessment of candidate skills and knowledge to identify any gaps and help plan the assessment. Qualification Profile Qualification title Ofqual qualification number 601/8167/9 Level 4 Total Qualification Time Assessment ProQual Level 4 Certificate in Cyber Security and Intrusion for Business 70 hours Qualification start date 1/12/15 Qualification end date Pass or fail Internally assessed and verified by centre staff External quality assurance by ProQual verifiers Qualification Structure Candidates must complete the 3 Mandatory units. T/507/9458 Cyber Security for Business Networks A/507/9459 Managing Cyber Security in Business M/507/9460 Cyber Intrusion for Business 3
4 Centre Requirements Centres must be approved to offer this qualification. If your centre is not approved please complete and submit form ProQual Additional Qualification Approval Application. Staff Staff delivering this qualification must be appropriately qualified and occupationally competent. Assessors/Internal Quality Assurance For each competence-based unit centres must be able to provide at least one assessor and one internal verifier who are suitably qualified for the specific occupational area. Assessors and internal verifiers for competence-based units or qualifications will normally need to hold appropriate assessor or verifier qualifications, such as: ProQual Level 3 Certificate in Teaching, Training and Assessing Award in Assessing Competence in the Work Environment Award in Assessing Vocationally Related Achievement Certificate in Assessing Vocational Achievement Award in the Internal Quality Assurance of Assessment Processes and Practices Certificate in Leading the Internal Quality Assurance of Assessment Processes and Practices Support for Candidates Materials produced by centres to support candidates should: enable them to track their achievements as they progress through the learning outcomes and assessment criteria; provide information on where ProQual s policies and procedures can be viewed; provide a means of enabling Internal and External Quality Assurance staff to authenticate evidence 4
5 Assessment Candidates must demonstrate the level of knowledge and competence described in the unit. Assessment is the process of measuring a candidate s knowledge and understanding against the standards set in the qualification. Assessment guidance is included to assure consistency. Each candidate is required to produce evidence which demonstrates their achievement of all of the learning outcomes and assessment criteria for each unit. Evidence can include: - assignments/projects/reports - worksheets - portfolio of evidence - record of oral and/or written questioning - candidate test papers Learning outcomes set out what a candidate is expected to know, understand or be able to do. Assessment criteria specify the standard a candidate must meet to show the learning outcome has been achieved. Learning outcomes and assessment criteria for this qualification can be found from page 7 onwards. Internal Quality Assurance An internal quality assurance verifier confirms that assessment decisions made in centres are made by competent and qualified assessors, that they are the result of sound and fair assessment practice and that they are recorded accurately and appropriately. Adjustments to Assessment Adjustments to standard assessment arrangements are made on the individual needs of candidates. ProQual s Reasonable Adjustments Policy and Special Consideration Policy sets out the steps to follow when implementing reasonable adjustments and special considerations and the service that ProQual provides for some of these arrangements. Centres should contact ProQual for further information or queries about the contents of the policy. 5
6 Results Enquiries and Appeals All enquiries relating to assessment or other decisions should be dealt with by centres, with reference to ProQual s Enquiries and Appeals Procedures. Certification Candidates who demonstrate achievement of the qualification will be awarded a certificate giving the full qualification title - ProQual Claiming certificates Centres may claim certificates for candidates who have been registered with ProQual and who have successfully achieved the required number of credits for a qualification. All certificates will be issued to the centre for successful candidates. Replacement certificates If a replacement certificate is required a request must be made to ProQual in writing. Replacement certificates are labelled as such and are only provided when the claim has been authenticated. Refer to the Fee Schedule for details of charges for replacement certificates. 6
7 Learning Outcomes and Assessment Criteria T/507/9458 Cyber Security for Business Networks Learning Outcomes the learner will: 1. Understand how to securely configure ICT systems Be able to securely configure ICT systems Understand how to test and monitor network security 4. Be able to test and monitor organisational network security 5. Understand the importance of compliance with organisational Malware Protection Policy 6. Be able to demonstrate compliance with organisational Malware Protection Policy Assessment Criteria the learner can: Explain the importance of securely configuring all ICT systems Explain the application of security patches Explain the purpose of a systems inventory Demonstrate the secure configuration of an ICT system Demonstrate the application of security patches Define a security baseline for all ICT devices Explain the purpose of penetration testing Explain the processes involved in penetration testing Evaluate software that can be used for penetration testing Explain the purpose of a network perimeter Explain why security controls must be monitored and tested Demonstrate penetration testing Identify network security issues through penetration testing Manage the network perimeter including wireless access Demonstrate the use of software setup related to malware and other monitoring products Analyse the monitoring and testing of security controls Explain the risks associated with a range of malware Evaluate a range of malware defences Explain the purpose of malware scanning Establish adequate malware defences Demonstrate malware scanning and secure backup of ICT systems 7
8 A/507/9459 Managing Cyber Security in Business Learning Objectives the learner will: 1. Understand the requirement to determine the risks to an organisations information 2. Understand the use of account management processes 3. Be able to demonstrate the use of account management processes 4. Understand the implementation of user security policies within organisations 5. Be able to develop user security policies within organisations 6. Understand how to manage cyber incident response and disaster recovery 7. Be able to manage cyber incident response and disaster recovery 8. Understand how to monitor organisational ICT systems and networks Assessment Criteria the learner can: Evaluate the need for an effective governance structure relating to cyber risk Explain a range of information risks Explain the potential approaches to account management processes Explain control procedures relating to activity and audit logs Explain the importance of monitoring user activities Demonstrate the use of account management processes Develop reports related to user privileges and accounts Demonstrate control procedure evidence related to activity and audit logs Monitor user activity, providing evidence and reports Explain the importance of organisational level user security policies Identify examples of acceptable and secure use policies Explain why staff training is essential for effective cyber security policies Identify current back door cyber threats Develop organisational level user security policies Determine the acceptable and secure use of organisational ICT systems Explain potential disaster recovery activities Explain the requirement for incident management plans Describe the reporting process for criminal incidents 7.1 Demonstrate an effective response to incidents and disaster recovery activities Explain the purpose of an ICT monitoring strategy Summarise the content of ICT security logs Explain how to secure ICT systems further to the indication of an attack 8
9 Learning Objectives the learner will: 9. Be able to monitor organisational ICT systems and networks 10. Be able to manage organisational Access to Removable Media Policy 11. Understand how to manage organisational Secure Use of ICT Policy for Home and Mobile Working 12. Be able to manage organisational Secure Use of ICT Policy for Home and Mobile Working Assessment Criteria the learner can: Determine an ICT Monitoring Strategy Develop an ICT Monitoring Policy Demonstrate the monitoring of ICT systems and networks Analyse security logs Secure all ICT systems further to the indication of an attack Explain the necessity for an Access to Removable Media Policy Develop an Access to Removable Media Policy Evaluate current government legislation and frameworks relevant to the control of digital data Identify the types of staff training events suitable for Home and Mobile Working policies. Explain how to apply a secure baseline build to all their organisation s ICT devices 12.1 Develop a Secure Use of ICT Policy for Home and Mobile Working for all employees 9
10 M/507/9460 Cyber Intrusion for Business Learning Outcomes the learner will: 1. Understand how to establish a security perimeter in a Wifi zone 2. Know how to establish a security perimeter within a Wifi zone 3. Understand the regulatory frameworks associated with cyber intrusion 4. Be able to analyse activities within Wifi zones Assessment Criteria the learner can: Explain the use of hardware and software related to security in Wifi zones Identify current back door threats Explain the importance of mobile device policies for Wifi zones Explain how hardware and software can be utilised in relation to securing a Wifi perimeter Explain what rogue access points are Identify applications that are of high risk to a network area Develop and demonstrate a mobile policy for Wifi zones Demonstrate the use of appropriate hardware and software in relation to securing a Wifi perimeter Provide an analysis of a Wifi zone Develop a policy on the detection of rogue access points and applications that are of risk to a network area Develop a policy to counter back door threats to networks Identify regulatory frameworks associated with Wifi monitoring Explain the legislation relating to hacking or breaking into user networks Evaluate the problems that can be encountered when monitoring Wifi zones Explain the risk associated with managing Wifi zones within an International context 4.1 Analyse potential problems that could be encountered when monitoring Wifi zones 10
11 Learning Objectives the learner will: 5. Know how to utilise technology to secure networks from hacking 6. Be able to utilise technology to secure networks from hacking Assessment Criteria the learner can: Explain the use of VPN functionality and application tunnelling to promote security Critically evaluate at least three commercial products that are available to secure LAN and other mobile networks Explain encryption methods such as TLS/SSL Explain the features of account lock out Explain host isolation in relation to Wifi networks Explain network separation in relation to Wifi networks Explain what a man in the middle attack is and how it affects network users Explain how to establish secure passwords Use VPN functionality and application tunnelling to promote security Secure a LAN using commercially available products Demonstrate the use of encryption methods such as TSL/SSL Demonstrate account lock out and show how to enable and secure this setting Establish secure passwords for network users Assessment There must be valid, authentic and sufficient for all the assessment criteria. However, one piece of evidence may be used to meet the requirements of more than one learning outcome or assessment criterion. 11
12 ProQual Awarding Body ProQual House Annie Med Lane South Cave HU15 2HG UK Tel: +44(0)
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Unit title: Cyber Security Fundamentals (SCQF level 4)
National Unit specification General information Unit code: H9T5 44 Superclass: CC Publication date: October 2015 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this Unit
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Networked Systems Security
Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
ICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 [email protected] This presentation will discuss current threats faced by public institutions,
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
EA-ISP-012-Network Management Policy
Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
Network Administration
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
New PCI Standards Enhance Security of Cardholder Data
December 2013 New PCI Standards Enhance Security of Cardholder Data By Angela K. Hipsher, CISA, QSA, Jeff A. Palgon, CPA, CISSP, QSA, and Craig D. Sullivan, CPA, CISA, QSA Payment cards a favorite target
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
Distance Assessment Policy
Distance Assessment Policy For internal and external use September 2013 Issue 1.0 Quality, Standards and Research Contents Contents 2 Scope of policy 3 Policy statement 4 Regulatory references 8 Policy
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Information System Audit Guide
Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.
National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
EDI Level 3 Assessing Qualifications. EDI Level 4 Internal Quality Assurance Qualifications. EDI Level 4 External Quality Assurance Qualifications
Vocational Qualifications EDI Level 3 Assessing Qualifications EDI Level 4 Internal Quality Assurance Qualifications EDI Level 4 External Quality Assurance Qualifications Candidate Pack Effective from:
INFORMATION SYSTEMS. Revised: August 2013
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree
Cyber Security: Potential Threats Impacting Organizations January 10, 2015 Scott Petree Agenda 2 Data Security Trends Root Causes of Cyber Attacks How Can We Fix This? Secure Infrastructure User Awareness
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
NERC CIP Compliance with Security Professional Services
NERC CIP Compliance with Professional Services The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
Code of Practice for Cyber Security in the Built Environment
Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber
G-Cloud Definition of Services Security Penetration Testing
G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
ICA60211 Advanced Diploma of Network Security
ICA60211 Advanced Diploma of Network Security Release 2 ICA60211 Advanced Diploma of Network Security Modification History Release Release 2 Release 1 Comments This version first released with ICA11 Information
Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit
Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary This Summary was prepared March 2009 by Ian Huggins prior to HSC adoption of the most recent
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
