Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Expert Solution & Answer
100%
Book Icon
Chapter 1, Problem 1RQ

Explanation of Solution

List of communities of interest that engage in an organization’s effort:

  • InfoSec Community (InfoSec managers and professionals):
  • This community protects the organizations information assets from the many threats they face.
  • InfoSec Community includes a risk manager or the CISO (Chief Information Security Officer).
  • Example:
  • This community comprises of the IT professionals, CISO and managers who bear the responsibility is to secure the information.
  • Information technology community (InfoSec technology managers and professionals):
  • This community supports the business objectives of the organization by supplying and supporting IT that is appropriate to the organizations need.
  • Information technology community includes a systems administrator or the CIO (chief information officer).
  • Example:
  • This community consists of IT professionals, CIO and managers who act as providers of information technologies and also supply other resources.
  • General business community (nontechnical managers and professionals):
  • This community articulates and communicates organizational policy and objectives and allocates resources to the other group.
  • General business community includes the CEO or the Director of Human Resources.
  • Example:
  • This community includes non-IT professional, users and managers.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Security breaches in information systems are very commonplace these days even though some organizations have what they believe is good security controls. Because of their vulnerability to threats from hackers, internal personnel, and poor management of Hardware and software devices, security controls always need revisiting.From my perspective as manager of the Accounts and Finance department, every security breach affects this department even if it is just down time to be at meetings, to discuss strategies and costs to repair damages. When the breaches occur, unauthorized access is gained to either, do something malicious to the organization's resources to steal or sabotage data for financial gain.This usually results in the company's reputation/integrity being damaged, Loss of revenue during downtime, high costs to repair and restructure. legal ramifications are expected as well if guilty persons are found or if customers decide to sew for breach of contract and losses.Two Reasons…
What Information Security responsibilities would you provide to a smaller organization with three full-time and two or three part-time roles? Among the departments is InfoSec. Name the departmental tasks that may be contracted out. Function distribution:
How are Requests for Information to be monitored?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning