Seguridad

Solo disponible en BuenasTareas
  • Páginas : 2 (500 palabras )
  • Descarga(s) : 0
  • Publicado : 5 de mayo de 2011
Leer documento completo
Vista previa del texto
Security Assesment
M.C. Juan Carlos Olivares Rojas
Department of Computer and System Instituto Tecnológico de Morelia jcolivar@itmorelia.edu.mx 19.72388 lat, -101.1848 long

Disclaimer
Somematerial in this presentation has been obtained from various sources, each of which has intellectual property, so in this presentation will only have some rights reserved. These slides are free, so youcan add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on my part. In return for use, I only ask the following: if you usethese slides (e.g., in a class) in substantially unaltered form, that you mention their source.

Outline
• • • • • • • • Generalities of Physical Area Security Logical and Confidential SecurityStaff Security Security Control Classification Data and Software Application Security Control for Software Applications Assesment Control for avoiding crime and informatic frauds Contingency Plan,Insurance, Procedures of Backup Disasters.

Outline
• Techniques and Tools related with physical and staff security. • Techniques and Tools related with data and software application security. Objectives of the Session
• The students will know the basis of Security Information. • The students will identified and applied some security controls in the organisations.

Competencias
•Genéricas: Análisis, Diseño de soluciones, Creatividad y Trabajo en equipo • Naturaleza Competencia: Entrenamiento • Competencias Específicas: • Conocimiento de los fundamentos de auditoria (conceptos básicos,planeación, Auditoría de la función informática, Presentación de Informes) • Conocimiento y Aplicación de los Estándares de Auditoria en Seguridad Informática y Redes.

Objetivo
• Los estudiantesdefinirán y aplicarán controles en diferentes áreas informáticas tales como: instalaciones físicas, recursos humanos, telecomunicaciones, seguridad de la información, realizando actividades de...
tracking img