Information Technology Reference
In-Depth Information
table 9.2
iA Serices and iA Mechanisms in Context of iA operations Cycle
IA Core 
Principles
Risk
Anticipate a
Defend
Monitor
Respond
Conidentiality
Disclosure
Security policy, risk
assessment, threat
assessment,
vulnerability
assessment, BIA, IA 2
Process, IA 2
Framework, security
management
program (SMP),
SETA, compliance
management
program (CMP)
Cryptography, PKI,
access controls,
identity
management,
privilege
management,
security operations
center (SOC)
Audit log creation,
log management,
content iltering,
SOC
SOC, CSIRT, digital
forensics
Integrity
Corruption
Ditto
Backups, hashing,
PKI
IDS, integrity checks
(e.g., cyclical
redundancy check
[CRC])
Self-corrective (e.g.,
retransmit), CSIRT,
BC/DR, backup
recovery
Availability
Denial of service
Ditto
OS security, host
coniguration, IDS,
anti-malware
NOC, SOC,
automated
“heartbeat”
monitoring
Redundant service
activation, CSIRT
 
Search WWH ::




Custom Search