MGMTOF INFORMATION SECURITY (LL) FDS
6th Edition
ISBN: 9780357195543
Author: WHITMAN
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 1RQ
Program Plan Intro
Information security is the protection of information in the organization; it helps to manage data access, web-browsing behaviors, passwords usage and encryption, email attachments, and so on.
- It is designed to provide structure in the workplace, create a productive and effective work place.
- It is free from unnecessary distractions.
Expert Solution & Answer
Explanation of Solution
Review of job descriptions:
If an organization undertakes an InfoSec-driven review of job description, all employee’s job description and subsequent performance are reviewed to make the whole organization proceeds InfoSec further serious.
- The employee job descriptions are recruiting, hiring, firing, managing and releasing human resources.
IT jobs not directly associated:
IT jobs which is not directly associated with InfoSec should be reviewed are auditing, HR(Human Resources), and purchasing jobs.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
when an orginization undertakes an infosec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed?
1 page double spaced please
For a smaller company with three full-time and two or three part-time InfoSec positions, what are the most important responsibilities that each should have? Divisions outside of information security. Define the roles of each division and whether or not their duties may be delegated. Break down the assignment of roles.
For a company of our size, what would you recommend the three full-time and two or three part-time Information Security positions do? Information Security and Related Groups. Define the roles of each division and whether or not their duties may be delegated. Address the issue of function assignment.
Chapter 9 Solutions
MGMTOF INFORMATION SECURITY (LL) FDS
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - Prob. 3RQCh. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Prob. 8RQCh. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 11RQCh. 9 - What is a performance target, and how is it used...Ch. 9 - List and describe the fields found in a properly...Ch. 9 - Prob. 14RQCh. 9 - Prob. 15RQCh. 9 - Prob. 16RQCh. 9 - Prob. 17RQCh. 9 - Prob. 18RQCh. 9 - Prob. 19RQCh. 9 - Prob. 20RQCh. 9 - Prob. 1ECh. 9 - Prob. 3ECh. 9 - Prob. 4ECh. 9 - Prob. 1DQCh. 9 - Prob. 2DQCh. 9 - Prob. 1EDMCh. 9 - Prob. 2EDMCh. 9 - Prob. 3EDM
Knowledge Booster
Similar questions
- Using a realistic scenario, evaluate the advantages and disadvantages of information security job division in an organization's information security procedures.arrow_forwardUse a plausible scenario to compare and contrast the benefits and drawbacks of information security job division in an organization's information security procedures.arrow_forwardFor a smaller company with three full-time and two or three part-time InfoSec roles, what would be the most important responsibilities, in your opinion? Groups like Information Security (InfoSec) and others. Define the roles of each division and whether or not their duties can be delegated. Justify the assignment of functions.arrow_forward
- For a smaller company with three full-time and two or three part-time InfoSec employees, what would be the most important responsibilities, in your opinion? Information Security and Related Groups. Define the roles of each division and whether or not their duties may be delegated. In a nutshell, describe how responsibilities are divided up.arrow_forwardExamine the benefits and drawbacks of information security division of roles within an organization's information security procedures by using a plausible scenario, and compare and contrast your findings.arrow_forwardIn the context of organizational structure, the determination of the appropriate placement of the information security function is a decision that should be made by relevant stakeholders within the organization. Why?arrow_forward
- Who within an organization is responsible for deciding where in the hierarchy the information security function should be housed? Why?arrow_forwardWhat are the tactics and goals of an information security incident plan designed to protect against an increase in theft and security incidents?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning