Preview

Information Security

Good Essays
Open Document
Open Document
2188 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security
Six Extended Characteristics of Information Security;
The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.
Planning;
The planning stage in Information Security (InfoSec) throughout the planning stage the Chief Information Officer (CIO) uses the IT objectives assembled from the business unit plants to create the organisations IT Strategy. The purpose of the IT strategy is to enlighten the IT functional area.
According to (Whitman, et al., 2010) the IT strategy may be used for an information security planning when the Chief Security Information Officer (CSIO) gets involved with the CIO or other executives to develop the strategy for the next lower level.
There is seven types of InfoSec plans;
• Incident Response
• Business continuity
• Disaster recovery
• Policy
• Personnel planning
• Technology rollout training and awareness
Policy;
There is three categories of policy that most enterprise organisations follow, the three policies are as followed;
Enterprise Information Security Policy (EISP)
An enterprise information security policy, also known as EISP and in simpler form it is also known as an Information Security policy (InfoSec). In high sight, according (Whitman, et al., 2010) the EISP is to guide the development, implementation, and management requirements of the Information security program, of which must be met by information security management, IT development, IT operations and other specific security functions.
There needs to be strict communication between the top level executives, these include the CISO and CIO, which consist to make sure the EISP supports the organisations vision and

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    • Complete the Network Security Policy and Executive Summary portions of the Information Security Policy.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Genericorp.

    • 312 Words
    • 2 Pages

    In developing the EIS, the first thing any company needs to determine is if the business is ready for the EIS. In Genericorp, Perry wanted EIS because he wanted to improve the image of IS department. With that sole objective, failure of EIS was inevitable. As well know, organizational pain is a very important factor in implementing the EIS in an organization. There is a high possibility of EIS failure if the system is implemented without necessity because without necessity companies are reluctant in keeping up with the maintenance, updates, and improvement of the system. Like in Genericorp, if top management regards EIS as a “nice to have” rather than a requirement to compete, EIS funding will be at the bottom of the priority list in difficult financial period.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    The purpose of the CIRT plan is to help an organization prepare for computer incidents. Preparation helps the organization identify potential incidents. Security personnel can then identify the best responses to reduce the potential damage…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Study Guide

    • 790 Words
    • 4 Pages

    17. __________ is not a part of an ordinary IT security policy framework? Page 192…

    • 790 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    |the role and involvement of senior management in determining and executing strategic information system in a global organisation. |…

    • 905 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Rang, J. (2003, September ). Are your it and strategic plans aligned. Retrieved from http://www.asaecenter.org/Resources/articledetail.cfm?ItemNumber=13514…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays