User talk:WideClyde
From Wikipedia, the free encyclopedia
[edit] Welcome to Wikipedia!
|
[edit] Information Security
Again, good work. I noted the addition of IA and Computer Security. Aside from fighting urges to wikify, I'll look forward to the finished article. Luis F. Gonzalez 16:21, 15 January 2007 (UTC)
[edit] IA Controls
Here's some more information on IA controls AKA security controls:
From DoDI 8500.2 there are 8 in the following two letter acronyms (TLA). Additional numbering adds more information.
- DC Security Design & Configuration
- IA Identification and Authentication
- EC Enclave and Computing Environment
- EB Enclave Boundary Defense
- PE Physical and Environmental
- PR Personnel
- CO Continuity
- VI Vulnerability and Incident Management
DoD breaks the down per CIA Triad (leg) or IA service.
From NIST Special Pub - SP 800-53 rev 1
- AC Access Control
- AT Awareness and Training
- AU Audit and Accountability
- CA Certification, Accreditation, and Security Assessments
- CM Configuration Management
- CP Contingency Planning
- IA Identification and Authentication
- IR Incident Response
- MA Maintenance
- MP Media Protection
- PE Physical and Environmental Protection
- PL Planning
- PS Personnel Security
- RA Risk Assessment
- SA System and Services Acquisition
- SC System and Communications Protection
- SI System and Information Integrity
NIST uses DoD methology by breaking down the control into TLAs and into Defense in Depth (computing) category (People - Techonology - Operations/Process).
From ISO 17799
Risk assessment and treatment - analysis of the organization's information security risks
- Security policy - management direction
- Organization of information security - governance of information security
- Asset management - inventory and classification of information assets
- Human resources security - security aspects for employees joining, moving and leaving an organization
- Physical and environmental security - protection of the computer facilities
- Communications and operations management - management of technical security controls in systems and networks
- Access control - restriction of access rights to networks, systems, applications, functions and data
- Information systems acquisition, development and maintenance - building security into applications
- Information security incident management - anticipating and responding appropriately to information security breaches
- Business continuity management - protecting, maintaining and recovering business-critical processes and systems
- Compliance - ensuring conformance with information security policies, standards, laws and regulations
I've yet to crack open the ISO ref. —The preceding unsigned comment was added by Luis F. Gonzalez (talk • contribs) 17:17, 15 January 2007 (UTC).
[edit] Infosec Progress
I've liked what you have done and will start to wiki some links. You may want to mention in the Security Classification section, Multilayer Security (MLS) OSs (a la Orange Book Labeling and certifications, e.g. C2, B2, etc). Luis F. Gonzalez 20:42, 20 January 2007 (UTC)
[edit] License tagging for Image:DefenseInDepthOnion.png
Thanks for uploading Image:DefenseInDepthOnion.png. Wikipedia gets thousands of images uploaded every day, and in order to verify that the images can be legally used on Wikipedia, the source and copyright status must be indicated. Images need to have an image tag applied to the image description page indicating the copyright status of the image. This uniform and easy-to-understand method of indicating the license status allows potential re-users of the images to know what they are allowed to do with the images.
For more information on using images, see the following pages:
This is an automated notice by OrphanBot. If you need help on selecting a tag to use, or in adding the tag to the image description, feel free to post a message at Wikipedia:Media copyright questions. 03:09, 21 January 2007 (UTC)
[edit] Great work
I just wanted to commend you on your writing of the Information security article. It looks great! If you ever have any questions or need any help with Wikipedia, I would be happy to help. —Centrx→talk • 00:51, 23 January 2007 (UTC)
[edit] CIA Traid
Here's an image of the infamous tripod. It can be implied that the Penrose triangle leads to an infinite process, a'la ant on a Mobius strip, but what I wanted to mention is that the point of CIA is to protect data-in-transit, data-at-rest and the services providing that data. This is meant as an addition to CIA, but as purpose behind the idealized model.
Additionally I had some Denfense in Depth onions I was working on as well...but hopefully if I ever get some graphics training and time, I'll post them up as well. Luis F. Gonzalez 03:19, 23 January 2007 (UTC)
- I do not think there is a policy against image re-use. Wikipedia is just anal retentive to protect itself against the copyright crowd.
- Change Management? Funny you should mention that. I'm studying up for the ITIL cert and I'm currently in the Change Management portion of a CBT, which BTW does not have good references. I'd have to dig around for "published" works on Change Management. All I can suggest now is the information on the Change Management (ITSM) link.
- MultiLevel security is a pain, but all the TRUSTED OS/DB products are all originally Orange Book concepts that will not die. Mentioning Bell-LaPadula/confidentiality will get it in.
- I'm not so sure about the poster, but it gets the point across. Luis F. Gonzalez 06:57, 23 January 2007 (UTC)
[edit] Added ConfidentialityIntegrityAvailability.png to image delete page. Obsolete.
[edit] Image:ConfidentialityIntegrityAvailability.png listed for deletion
An image or media file that you uploaded or altered, Image:ConfidentialityIntegrityAvailability.png, has been listed at Wikipedia:Images and media for deletion. Please look there to see why this is (you may have to search for the title of the image to find its entry), if you are interested in it not being deleted. Thank you. WideClyde 02:44, 1 February 2007 (UTC) WideClyde 02:44, 1 February 2007 (UTC)
[edit] Parkerian Hexad
I recently had a talk with several (ISC)^2 folks, Dow Williamson and others, and they mentioned no change from the Triad to Hexad. Additionally I don't think the Hexad's elements are atomic, but that's just my opinion. Luis F. Gonzalez 17:32, 23 March 2007 (UTC)
- I'm no longer in academia, but I think that John Y wants more academic flavoring in the article e.g. theories, formulas and proofs. But then again that's why I left the tower of ivory. On another topic I personally think the poster is too DoD centric. Luis F. Gonzalez 17:28, 24 March 2007 (UTC)