11 what functions does the security manager perform

This preview shows page 16 - 18 out of 18 pages.

11. What functions does the security manager perform, and what are the key qualifications and requirements for the position? Functions: 1 day-to-day operation of the information security 2 Accomplishment of objectives identified by the CISO and resolve the issues identified by the technicians 3 technology configuration, operation 4 fault resolution 5 scheduling 6setting relative priorities Qualifications: Traditionally, managers earn the CISSP or CISM and technical professionals earn the global Information Assurance certification (GIAC). They must have experience and ability to draft middle-and lower-level policies and well as standards and guide lines. And they must have experience with budgeting. Project management, hiring and firing 12. What functions does the security technician perform, and what are the key qualifications and requirements for the position? Functions: 1. Configure fire walls 2 .Deploy IDSS 3 .Implement security software 4. Diagnose and trouble shoot problems 5. Coordinate with systems and network administrators to ensure that an organization Qualifications: organizations prefer the expert, certified, proficient technician. Regard less of the area; the particular job description covers some level of experience with a particular hardware and software package. 19. What is separation of duties? How can it be used to improve an organization’s information security practices? Separation of duties is a cornerstone in the protection of information assets and in the prevention of financial loss. Separation of duties is a control used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or availability of information. The control stipulates that the completion of a significant task that involves sensitive information should require at least two people. The idea behind this separation is that if only one person had the authorization to access a particular set of information, there may be nothing the organization could do to prevent this individual form copying the information and removing it from the premises. Separation of duties is important and thus communally implemented. When the information in question of a financial nature. Chapter 12
Image of page 16

Subscribe to view the full document.

1. List and define the factors that are likely to shift in an organization security environment. The factors those are likely to shift in an organization’s information security environment as follows: 1 the dynamic aspects of the organizations environment 2 new types of attacks such as new visas us, worms and denial of service attacks. Dynamic aspects: 1 New assets are acquired 2 New vulnerabilities associated with the new or existing assents emerge. 3Business priorities shift 4 New partnerships are formed 5 Old partner ships dissolve 6 Organizational divestiture and acquisition occur 7 Employees, who are trained, educated, and mode aware of the new policies, procedures and technologies leave 8 New personnel are hired, thus possible creating new vulnerabilities 2. Who decides if the information security program can adapt to change
Image of page 17
Image of page 18

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern