Question: 1 . How do the InfoSec management team s goals and objectives differ from those of the IT and general management communities? o Answer: 2
How do the InfoSec management teams goals and objectives differ from those of the IT and general management communities?
o Answer:
What is included in the InfoSec planning model?
o Answer:
List and briefly describe the general categories of information security policy.
o Answer:
Briefly describe strategic planning.
o Answer:
List and briefly describe the levels of planning.
o Answer:
What is governance in the context of information security management?
o Answer:
Describe the critical characteristics of information. How are they used in the study of computer security?
o Answer:
What are the differences between a policy, a standard, and a practice? Where would each be used?
o Answer:
What is an EISP, and what purpose does it serve?
o Answer:
Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology?
o Answer:
What is needed for an information security policy to remain viable?
o Answer:
How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it
o Answer:
Where can a security administrator find information on established security frameworks?
o Answer:
What is the ISO series of standards? Which individual standards make up the series?
o Answer:
What documents are available from the NIST Computer Security Resource Center CSRC and how can they support the development of a security framework?
o Answer:
What Web resources can aid an organization in developing best practices as part of a security framework?
o Answer:
Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework.
o Answer:
What is defense in depth?
o Answer:
Define and briefly explain the SETA program and what it is used for.
o Answer:
What is the purpose of the SETA program?
o Answer:
What is security training?
o Answer:
What is a security awareness program?
o Answer:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
