Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 9, Problem 1RQ
Program Plan Intro

Information security (InfoSec):

Information security is the protection of information in the organization; it helps to manage data access, web-browsing behaviors, passwords usage and encryption, email attachments, and so on.

  • It is designed to provide structure in the workplace, create a productive and effective work place.
  • It is free from unnecessary distractions.

Expert Solution & Answer
Check Mark

Explanation of Solution

Review of job descriptions:

If an organization undertakes an InfoSec-driven review of job description, all employee’s job description and subsequent performance are reviewed to make the whole organization proceeds InfoSec further serious.

  • The employee job descriptions are recruiting, hiring, firing, managing and releasing human resources.

IT jobs not directly associated:

IT jobs which is not directly associated with InfoSec should be reviewed are auditing, HR(Human Resources), and purchasing jobs.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
when an orginization undertakes an infosec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 1 page double spaced please
For a smaller company with three full-time and two or three part-time InfoSec positions, what are the most important responsibilities that each should have? Divisions outside of information security. Define the roles of each division and whether or not their duties may be delegated. Break down the assignment of roles.
For a company of our size, what would you recommend the three full-time and two or three part-time Information Security positions do? Information Security and Related Groups. Define the roles of each division and whether or not their duties may be delegated. Address the issue of function assignment.
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning