SlideShare a Scribd company logo
1 of 18
Security And Personnel
Contents:
 Introduction
 The security function within an Organization’s Structure
 Staffing the security function
 Qualification and Requirements
 Entry into security profession
 Information Security Positions
 Chief information security officer
 Security manager
 Security technician
 Internal security consultant
Introduction
 Each organization should examine the options possible for staffing the
information security function.
 When implementing security in an organization, there are many human
resources issues that must be addressed:
 The entire organization must decide how to position and name the security function
within an organization.
 The information security community of interest must plan for proper staffing for the
information security function.
 The IT community of interest must understand the impact of information security
 The general management community of interest must work with the information security
professionals to integrate solid information security concepts
The Security Function within an organization’s structure
The security function can be placed within the:
IT function, as a peer of other functions such as networks, applications
development, and the help desk
Physical security function, as a peer of physical security or protective
services.
Administrative services function, as a peer of human resources or
purchasing
Insurance and risk management function
Legal development
Staffing the security function
 Selecting information security personnel is based on a number of criteria.
 Some of these factors are within the control of the organization and others
some are not.
 Some of the services are
 Qualifications and requirements
 Entry into the security profession
 Information security positions
Qualifications and Requirements:
 A number of factors influence an organization’s hiring decisions.
 Because information security has only recently emerged as a separate
discipline, the hiring decisions in this field are further complicated by a lack of
understanding among organizations about what qualifications a potential
information security hire should exhibit.
 Currently in many organizations, information security teams lack established
roles and responsibilities.
 Establishing better hiring practices in an organization requires the following:
 The general management community of interest should learn more about
the skills and qualifications for both information security positions and
those IT positions that impact information security.
 Upper management should learn more about the budgetary needs of the
information security function and the positions within it. This will
enable management to make sound fiscal decisions for both the
information security function and the IT functions that carry out many
of the information security initiatives.
 The IT and general management communities should grant appropriate
levels of influence and prestige to the information security function,
and especially to the role of chief information security officer.
 When hiring information security professionals, organizations frequently
look for individuals who understand the following:
 How an organization operates at all levels
 That information security is usually a management problem and is
seldom an exclusively technical problem
 How to work with people and collaborate with end users, and the
importance of strong communications and writing skills
 The role of policy in guiding security efforts, and the role of education and
training in making employees and other authorized users part of the
solution, rather than part of the problem
 Most mainstream IT technologies (not necessarily as experts, but as
generalists)
 The terminology of IT and information security
 The threats facing an organization and how these threats can become
attacks
 How to protect an organization’s assets from information security attacks
 How business solutions (including technology-based solutions) can be
applied to solve specific information security problems
Entry into the Information Security Profession
 Many information security professionals enter the field through one of two
career paths:
 ex-law enforcement and military personnel involved in national security
and cyber-security tasks, who move from those
 environments into business-oriented information security; and technical
professionals—networking experts, programmers, database administrators,
and systems administrators—who find themselves working on information
security applications and processes more often than on traditional IT
assignments.
 In recent years, a third (perhaps in some sense more traditional) career path
has developed: college students who select and tailor their degree programs
to prepare for work in the field of information security.
Information Security Positions

 The use of standard job descriptions can increase the degree of
professionalism in the information security field as well as improve the
consistency of roles and responsibilities among organizations.
 Organizations anticipating a revision of these roles and responsibilities can
consult Charles Cresson Wood’s book Information Security Roles and
Responsibilities Made Easy, which offers a set of model job descriptions
for information security positions.
 The book also identifies the responsibilities and duties of the members of
the IT staff whose work involves information security.
Position in information security
Chief Security
Officer
Information
Security
Consultant

Information Security
Manager

Information Security
Administrator

Information Security
Technician / Engineer

Physical Security
Manager

Physical Security
Officer
Chief Information Security Officer (CISO or CSO)
 This is typically the top information security officer in the organization.
 In many cases, the CISO is the major definer or architect of the
information security program.
 The CISO performs the following functions:
 Manages the overall information security program for the organization
 Drafts or approves information security policies
 Works with the CIO on strategic plans, develops tactical plans, and works with security
managers on operational plans
 Develops information security budgets based on available funding
 Sets priorities for the purchase and implementation of information security projects and
technology
 Makes decisions or recommendations on the recruiting, hiring, and firing of security staff
 Acts as the spokesperson for the information security team
Security Manager

 Security managers are accountable for the day-to-day operation of the
information security program.
 They accomplish objectives identified by the CISO and resolve issues
identified by technicians.
 Management of technology requires an understanding of the technology
administered, but does not necessarily require proficiency in the
technology’s configuration, operation, and fault resolution.
Security Technician

 Security technicians are the technically qualified individuals tasked to
configure firewalls, deploy IDPSs, implement security software, diagnose
and troubleshoot problems, and coordinate with systems and network
administrators to ensure that an organization’s security technology is
properly implemented.
 The position of security technician is often entry level, but to be hired in
this role, candidates must possess some technical skills.
 This often poses a dilemma for applicants as many seeking to enter a new
field find it is difficult to get a job without experience—which they can
only attain by getting a job.
From internet…

 http://www.securitypersonnel.com/
 Providing services for securing the business information.
• http://system.vccs.edu/its/standards/PersonnelSecurityStandard.htm
• Personnel Security Standard
Purpose
This standard is intended to ensure security controls and related
procedures are implemented to protect the privacy, security and integrity of
VCCS information technology resources against unauthorized or improper
use, and to prevent and detect attempts to compromise information
technology resources for any employee who is separated, transferred, or
promoted.
 http://www.cpni.gov.uk/advice/Personnel-security1/

Cypher security
Personnel security
Physical security
Security and personnel bp11521
Security and personnel bp11521

More Related Content

What's hot

Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security ProfessionalHatem ElSahhar
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKATHEESKUMAR S
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 

What's hot (20)

Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Physical security
Physical securityPhysical security
Physical security
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security policy
Security policySecurity policy
Security policy
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Information security
Information securityInformation security
Information security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
The need for security
The need for securityThe need for security
The need for security
 

Similar to Security and personnel bp11521

Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxkatherncarlyle
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxdaniahendric
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingCCI Training Center
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingCCI Training Center
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Cyber Security Engineer: How to Build a Rewarding Career
Cyber Security Engineer: How to Build a Rewarding CareerCyber Security Engineer: How to Build a Rewarding Career
Cyber Security Engineer: How to Build a Rewarding CareerFredReynolds2
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentationdjglass
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...AmeliaJonas2
 

Similar to Security and personnel bp11521 (20)

Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
 
Role management
Role managementRole management
Role management
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cyber Security Engineer: How to Build a Rewarding Career
Cyber Security Engineer: How to Build a Rewarding CareerCyber Security Engineer: How to Build a Rewarding Career
Cyber Security Engineer: How to Build a Rewarding Career
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentation
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

Security and personnel bp11521

  • 2. Contents:  Introduction  The security function within an Organization’s Structure  Staffing the security function  Qualification and Requirements  Entry into security profession  Information Security Positions  Chief information security officer  Security manager  Security technician  Internal security consultant
  • 3. Introduction  Each organization should examine the options possible for staffing the information security function.  When implementing security in an organization, there are many human resources issues that must be addressed:  The entire organization must decide how to position and name the security function within an organization.  The information security community of interest must plan for proper staffing for the information security function.  The IT community of interest must understand the impact of information security  The general management community of interest must work with the information security professionals to integrate solid information security concepts
  • 4. The Security Function within an organization’s structure The security function can be placed within the: IT function, as a peer of other functions such as networks, applications development, and the help desk Physical security function, as a peer of physical security or protective services. Administrative services function, as a peer of human resources or purchasing Insurance and risk management function Legal development
  • 5. Staffing the security function  Selecting information security personnel is based on a number of criteria.  Some of these factors are within the control of the organization and others some are not.  Some of the services are  Qualifications and requirements  Entry into the security profession  Information security positions
  • 6. Qualifications and Requirements:  A number of factors influence an organization’s hiring decisions.  Because information security has only recently emerged as a separate discipline, the hiring decisions in this field are further complicated by a lack of understanding among organizations about what qualifications a potential information security hire should exhibit.  Currently in many organizations, information security teams lack established roles and responsibilities.  Establishing better hiring practices in an organization requires the following:  The general management community of interest should learn more about the skills and qualifications for both information security positions and those IT positions that impact information security.
  • 7.  Upper management should learn more about the budgetary needs of the information security function and the positions within it. This will enable management to make sound fiscal decisions for both the information security function and the IT functions that carry out many of the information security initiatives.  The IT and general management communities should grant appropriate levels of influence and prestige to the information security function, and especially to the role of chief information security officer.  When hiring information security professionals, organizations frequently look for individuals who understand the following:  How an organization operates at all levels  That information security is usually a management problem and is seldom an exclusively technical problem
  • 8.  How to work with people and collaborate with end users, and the importance of strong communications and writing skills  The role of policy in guiding security efforts, and the role of education and training in making employees and other authorized users part of the solution, rather than part of the problem  Most mainstream IT technologies (not necessarily as experts, but as generalists)  The terminology of IT and information security  The threats facing an organization and how these threats can become attacks  How to protect an organization’s assets from information security attacks  How business solutions (including technology-based solutions) can be applied to solve specific information security problems
  • 9. Entry into the Information Security Profession  Many information security professionals enter the field through one of two career paths:  ex-law enforcement and military personnel involved in national security and cyber-security tasks, who move from those  environments into business-oriented information security; and technical professionals—networking experts, programmers, database administrators, and systems administrators—who find themselves working on information security applications and processes more often than on traditional IT assignments.  In recent years, a third (perhaps in some sense more traditional) career path has developed: college students who select and tailor their degree programs to prepare for work in the field of information security.
  • 10. Information Security Positions  The use of standard job descriptions can increase the degree of professionalism in the information security field as well as improve the consistency of roles and responsibilities among organizations.  Organizations anticipating a revision of these roles and responsibilities can consult Charles Cresson Wood’s book Information Security Roles and Responsibilities Made Easy, which offers a set of model job descriptions for information security positions.  The book also identifies the responsibilities and duties of the members of the IT staff whose work involves information security.
  • 11. Position in information security Chief Security Officer Information Security Consultant Information Security Manager Information Security Administrator Information Security Technician / Engineer Physical Security Manager Physical Security Officer
  • 12. Chief Information Security Officer (CISO or CSO)  This is typically the top information security officer in the organization.  In many cases, the CISO is the major definer or architect of the information security program.  The CISO performs the following functions:  Manages the overall information security program for the organization  Drafts or approves information security policies  Works with the CIO on strategic plans, develops tactical plans, and works with security managers on operational plans  Develops information security budgets based on available funding  Sets priorities for the purchase and implementation of information security projects and technology  Makes decisions or recommendations on the recruiting, hiring, and firing of security staff  Acts as the spokesperson for the information security team
  • 13. Security Manager  Security managers are accountable for the day-to-day operation of the information security program.  They accomplish objectives identified by the CISO and resolve issues identified by technicians.  Management of technology requires an understanding of the technology administered, but does not necessarily require proficiency in the technology’s configuration, operation, and fault resolution.
  • 14. Security Technician  Security technicians are the technically qualified individuals tasked to configure firewalls, deploy IDPSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented.  The position of security technician is often entry level, but to be hired in this role, candidates must possess some technical skills.  This often poses a dilemma for applicants as many seeking to enter a new field find it is difficult to get a job without experience—which they can only attain by getting a job.
  • 15. From internet…  http://www.securitypersonnel.com/  Providing services for securing the business information. • http://system.vccs.edu/its/standards/PersonnelSecurityStandard.htm • Personnel Security Standard Purpose This standard is intended to ensure security controls and related procedures are implemented to protect the privacy, security and integrity of VCCS information technology resources against unauthorized or improper use, and to prevent and detect attempts to compromise information technology resources for any employee who is separated, transferred, or promoted.