Information security is the protection of information in the organization; it helps to manage data access, web-browsing behaviors, passwords usage and encryption, email attachments, and so on.
- It is designed to provide structure in the workplace, create a productive and effective work place.
- It is free from unnecessary distractions.
Explanation of Solution
Review of job descriptions:
If an organization undertakes an InfoSec-driven review of job description, all employee’s job description and subsequent performance are reviewed to make the whole organization proceeds InfoSec further serious.
- The employee job descriptions are recruiting, hiring, firing, managing and releasing human resources.
IT jobs not directly associated:
IT jobs which is not directly associated with InfoSec should be reviewed are auditing, HR(Human Resources), and purchasing jobs.
Want to see more full solutions like this?
Chapter 9 Solutions
MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
- What are the tactics and goals of an information security incident plan designed to protect against an increase in theft and security incidents?arrow_forwardChain Link Consulting is an information technology consulting company that focuses on system security concerns. When the company's president asks you to assist her with the preparation of a presentation for a group of potential clients at a trade show meeting next month, you say "yes." First and foremost, she would like you to examine system security concerns in light of all six security levels. Afterwards, she wants you to come up with a list of methods that Chain Link might evaluate a client's security procedures in order to obtain an accurate evaluation of their level of exposure.It was her way of making the situation more intriguing by saying that it was fine to be imaginative in your ideas, but that you should avoid proposing anything that would be unlawful or immoral. Example: It might be OK to pretend as a job candidate with phony references to see whether they were being reviewed, but it would be inappropriate to steal a lock and access the computer room to check on things.Your…arrow_forwardCISOs are tasked with creating a strategy for a company's information security program. What are the most significant aspects of a security program in your opinion?arrow_forward
- A project plan is a company's information security blueprint, but how does this occur?arrow_forwardThe information security plan of an organization serves as a project strategy, but how is this accomplished?arrow_forwardwhen an orginization undertakes an infosec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 1 page double spaced pleasearrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning