Information security is the protection of information in the organization; it helps to manage data access, web-browsing behaviors, passwords usage and encryption, email attachments, and so on.
- It is designed to provide structure in the workplace, create a productive and effective work place.
- It is free from unnecessary distractions.
Explanation of Solution
Review of job descriptions:
If an organization undertakes an InfoSec-driven review of job description, all employee’s job description and subsequent performance are reviewed to make the whole organization proceeds InfoSec further serious.
- The employee job descriptions are recruiting, hiring, firing, managing and releasing human resources.
IT jobs not directly associated:
IT jobs which is not directly associated with InfoSec should be reviewed are auditing, HR(Human Resources), and purchasing jobs.
Want to see more full solutions like this?
Chapter 9 Solutions
MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
- Using a realistic scenario, evaluate the advantages and disadvantages of information security job division in an organization's information security procedures.arrow_forwardUse a plausible scenario to compare and contrast the benefits and drawbacks of information security job division in an organization's information security procedures.arrow_forwardFor a smaller company with three full-time and two or three part-time InfoSec roles, what would be the most important responsibilities, in your opinion? Groups like Information Security (InfoSec) and others. Define the roles of each division and whether or not their duties can be delegated. Justify the assignment of functions.arrow_forward
- For a smaller company with three full-time and two or three part-time InfoSec employees, what would be the most important responsibilities, in your opinion? Information Security and Related Groups. Define the roles of each division and whether or not their duties may be delegated. In a nutshell, describe how responsibilities are divided up.arrow_forwardExamine the benefits and drawbacks of information security division of roles within an organization's information security procedures by using a plausible scenario, and compare and contrast your findings.arrow_forwardIn the context of organizational structure, the determination of the appropriate placement of the information security function is a decision that should be made by relevant stakeholders within the organization. Why?arrow_forward
- Who within an organization is responsible for deciding where in the hierarchy the information security function should be housed? Why?arrow_forwardWhat are the tactics and goals of an information security incident plan designed to protect against an increase in theft and security incidents?arrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning