Ch10 - Management of Information Security, 2nd ed. 1-1...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Management of Information Security, 2 nd ed. 1-1 Chapter 10 Personnel and Security At a Glance Instructor’s Manual Table of Contents Chapter Overview Chapter Outline Chapter Objectives Setup Notes Lecture Notes and Teaching Tips with Quick Quizzes Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Management of Information Security, 2 nd ed. 1-2 Chapter Overview In this chapter, readers will extend their understanding of the skills and requirements for information security positions introduced in Chapter 5. They will explore the various information security professional certifications, and identify which skills are encompassed by each. The second half of the chapter explores the implementation information security constraints on the organization’s human resources processes that are used to control employee behavior and prevent misuse of information. Chapter Outline Lecture Topics Page # Introduction 395 Staffing the Security Function 395 Information Security Professional Credentials 407 Employment Policies and Practices 416 Chapter Objectives When you complete this chapter, you will be able to: Identify the skills and requirements for information security positions Recognize the various information security professional certifications, and identify which skills are encompassed by each Understand and implement information security constraints on the general hiring processes Understand the role of information security in employee terminations Describe the security practices used to control employee behavior and prevent misuse of information
Background image of page 2
nd ed. 1-3 Setup Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction Maintaining a secure environment requires that the InfoSec department be carefully structured and staffed with appropriately credentialed personnel. It also requires that the proper procedures be integrated into all human resources activities, including hiring, training, promotion, and termination practices. Staffing the Security Function Selecting an effective mix of information security personnel for a given organization requires that you consider a number of criteria. Some are within the control of the organization; others are not. In general, when the demand for any commodity—including personnel with critical information security technical or managerial skills—rises quickly, the initial supply often fails to meet it. As demand becomes known, professionals entering the job market or refocusing their job
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/19/2009 for the course ITCS ITCS937 taught by Professor Watfa during the Summer '09 term at University of Warsaw.

Page1 / 23

Ch10 - Management of Information Security, 2nd ed. 1-1...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online