TutorialWeek05 - ITC482 Computer Management & Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Tutorial Week 05 Tutorial Week 05 Week 05: Developing the Security Program Review Questions 1. What is an information security program? 2. What functions constitute a complete information security program? 3. What organizational variables can influence the size and composition of an information security program’s staff? 4. What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization? 5. Where can an organization place the information security unit? Where should (and shouldn’t) it be placed? 6. Into what four areas should the information security functions be divided? 7. What are the five roles that an information security professional can assume? 8. What are the three areas of the SETA program? 9. What can influence the effectiveness of a training program? 10.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

TutorialWeek05 - ITC482 Computer Management & Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online