Preview

Information Security

Good Essays
Open Document
Open Document
2188 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
Six Extended Characteristics of Information Security;
The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.
Planning;
The planning stage in Information Security (InfoSec) throughout the planning stage the Chief Information Officer (CIO) uses the IT objectives assembled from the business unit plants to create the organisations IT Strategy. The purpose of the IT strategy is to enlighten the IT functional area.
According to (Whitman, et al., 2010) the IT strategy may be used for an information security planning when the Chief Security Information Officer (CSIO) gets involved with the CIO or other executives to develop the strategy for the next lower level.
There is seven types of InfoSec plans;
• Incident Response
• Business continuity
• Disaster recovery
• Policy
• Personnel planning
• Technology rollout training and awareness
Policy;
There is three categories of policy that most enterprise organisations follow, the three policies are as followed;
Enterprise Information Security Policy (EISP)
An enterprise information security policy, also known as EISP and in simpler form it is also known as an Information Security policy (InfoSec). In high sight, according (Whitman, et al., 2010) the EISP is to guide the development, implementation, and management requirements of the Information security program, of which must be met by information security management, IT development, IT operations and other specific security functions.
There needs to be strict communication between the top level executives, these include the CISO and CIO, which consist to make sure the EISP supports the organisations vision and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Genericorp.

    • 312 Words
    • 2 Pages

    In developing the EIS, the first thing any company needs to determine is if the business is ready for the EIS. In Genericorp, Perry wanted EIS because he wanted to improve the image of IS department. With that sole objective, failure of EIS was inevitable. As well know, organizational pain is a very important factor in implementing the EIS in an organization. There is a high possibility of EIS failure if the system is implemented without necessity because without necessity companies are reluctant in keeping up with the maintenance, updates, and improvement of the system. Like in Genericorp, if top management regards EIS as a “nice to have” rather than a requirement to compete, EIS funding will be at the bottom of the priority list in difficult financial period.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    I. Control Objectives for Information and Related Technology, contains good practices for IT management provided by ISACA. Provides a extensive framework for ensuring your IT is being used to support your organization in the best possible manner.…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Movie Vs Movie Analysis

    • 2302 Words
    • 10 Pages

    As the strategist, the CIO has the responsibility to look for different business models that the company may profit from. The CIO is looking into the huge amount of data and trend shifts. The data analysis can help the company to gain insight into the future market.…

    • 2302 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    |the role and involvement of senior management in determining and executing strategic information system in a global organisation. |…

    • 905 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch14

    • 11622 Words
    • 55 Pages

    2) As a member of senior management, the CIO is responsible for strategic level IS planning and for ensuring that all IS plans, systems, and operations support the organization's overall strategy.…

    • 11622 Words
    • 55 Pages
    Satisfactory Essays