Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Expert Solution & Answer
Book Icon
Chapter 11, Problem 2E

Explanation of Solution

 Sites related to ongoing responsibilities of security manager:

  • Responsibilities of Cyber-security Manager
    • Manage the firewalls, international business systems, encryption, vulnerability assessment, testing and many others.
    • Train the employees about the third-party risk and issues related to data privacy.
    • Monitor all operations and infrastructure, internal and external policy compliance and regulation compliance
    • Maintain various security tools and technology...

Explanation of Solution

 Components of security management used for adapting the security management model:

  • Fault management
    • It is used for detecting, isolating and resolving the problems related to threats.
  • Configuration and name management
    • It is used for establishing and managing the product’s consistency...

Blurred answer
Students have asked these similar questions
What are the possible security vulnerabilities when developing a plan of action and milestones?
When it comes to reviewing security operations and making suggestions for improvements, why would a security manager choose to employ an outside company rather than perform the research in-house?
Objectives Develop questions to gain further insight and help get the client and tester on the same page Create a sample scope for an security assessment Create and revise Rules of Engagement for the test Overview You were given a Request For Proposal  (RFP) but it seems to be lacking enough details to determine what the client is requesting for a test. We will need to come up with some information and questions to discuss with the client to determine what exactly they are wanting. This will allow both the client and the tester to be on the same page prior to beginning any assessment. We will be building a Scope and Rules of Engagement (ROE) to determine what is in scope and the document that outlines specifics of the project and how it will occur. Below are some of the key points pulled from the RFP that was lacking a lot of details: The test is for CIT-E Corp with 2,000 employees located throughout the United States They want a penetration test from either an outside company or…
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning