Question: responses to at least three posts, focus on similarities between the real - world scenario that can be for discussion and the one that another
responses to at least three posts, focus on similarities between the realworld scenario that can be for discussion and the one that another student chooses.
Planning Planning is one of the six Ps Strategic planning sets the longterm path that should be pursued by the organization and its components. Organizational operations must be directed by strategic planning, which should also concentrate resources on particular, welldefined objectives. The best way to oversee the information security function that delivers corporate accountability and strategic planning is by using an approach that the industry refers to as governance, risk management, and compliance GRC In order to be effective and to offer a sustainable approach, information security objectives should be addressed at the highest levels of an organization's management team. When an organization has a formal board of directors, governance review and supervision should start there.
Programs Once an organization has a general security policy, then implement a security education, training, and awareness SETA program. Security awareness, security training, and education together form the SETA program. SETA is a control mechanism used to lower unintentional security breaches. The way in which SETA enhances security is by improving awareness, developing skills and knowledge, and building indepth knowledge.
Even though not every member of an organization needs a formal degree or certificate in security, everyone in the organization should be trained and aware of information security. Security training provides members of the organization with detailed information and handson instruction to prepare them to perform their duties securely One of the least often carried out but most useful initiatives is security awareness. It is intended to maintain user's attention on information security.
In a recent cyber espionage campaign, Indias government and energy sectors were breached Significant Cyber Incidents CSIS, nd The hackers sent a malicious file disguised as a letter from Indias Royal Air Force to offices responsible for Indias electronic communications, IT governance, and national defense. That is what would happen when the users are not given proper uptodate security training and awareness Hu et al This seems to be a perfect example to tell us the importance of SETA programs in an organization.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
