Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 11, Problem 2RQ
Program Plan Intro
- The information security program defines structure and format of controlling the risks related to the information security of a company or an organization.
- This program includes all objectives, planning and policies of the information security.
- It includes three principles namely, confidentiality, integrity and availability.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Is information security policy considered static or dynamic? Why do you think this scenario will turn out the way it does?
Is information security management still relevant today?
Who in an organisation should decide where the organisational structure should place the information security function? Why?
Chapter 11 Solutions
Management Of Information Security
Ch. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20RQCh. 11 - Prob. 1ECh. 11 - Prob. 2ECh. 11 - Prob. 3ECh. 11 - Prob. 4ECh. 11 - Prob. 5ECh. 11 - Prob. 1DQCh. 11 - Prob. 2DQCh. 11 - Prob. 1EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What function does the administration of information security serve in the current setting?arrow_forwardWhat function does information security management play in the current environment?arrow_forwardWhen does an organization's information security begin and end? Where do the security policies and processes of an organization begin and end? Do you think these limits might be loosened?arrow_forward
- Who in an organisation should decide where the information security function should be positioned in the organisational structure? Why?arrow_forwardWho should determine where in the organisational structure the information security position belongs? Why?arrow_forwardWhat function does information security management serve in the context of the current world?arrow_forward
- When does information security begin and end for an organisation? Where do an organization's security rules and procedures begin and end? Do you believe that these restrictions may be widened?arrow_forwardList and describe the variables that are most likely to change in an organization's information security environment over the course of time.arrow_forwardWho in an organisation should decide how far up the organisational hierarchy the information security function should be placed? Why?arrow_forward
- Who should decide where the information security function is located in an organization's organisational structure? Why?arrow_forwardIs security policy considered static or dynamic in comparison to information security standardsa?arrow_forwardWhat function does the administration of information security serve in the present context?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning