expand icon
book Management of Information Security 4th Edition by Michael Whitman ,Herbert Mattord cover

Management of Information Security 4th Edition by Michael Whitman ,Herbert Mattord

Edition 4ISBN: 978-1285062297
book Management of Information Security 4th Edition by Michael Whitman ,Herbert Mattord cover

Management of Information Security 4th Edition by Michael Whitman ,Herbert Mattord

Edition 4ISBN: 978-1285062297
Exercise 1
Charley and Iris met for a working lunch.
"First thing you need to do," Charley told Iris when they met, "is gain some consensus from your higher management to fund a new position for a security analyst. Then fill it by finding someone who knows the security skills but is primarily skilled in project management. Or find a strong security analyst and send them off for PM training."
"Why so" Iris asked.
"A good project manager can help the entire team learn how to manage all the security projects to keep you from getting overwhelmed with deadlines and deliverables," Charley said, smiling. "A good PM can make your operations proactive rather than reactive."
"That sounds good," Iris replied. "What else do I need to know"
Based on your reading of the chapter and what you now know about the issues, list at least three other things Charley could recommend to Iris.
Explanation
Verified
like image
like image
Information security management:
It is defined as the system which controls and implements the security of confidential and sensitive information. Protects the assets and information from threats and vulnerability. It includes the systems and different hardware's to secure the information.
The three other things that C could recommend to I are as follows:
• Differentiate between information security managers and professionals , IT managers and professionals, and non-technical professionals.
• The Information Security (InfoSec ) Community: It protects all the valuable information of an organization from serious threats which they face. It includes IT professionals and managers whose prime responsibility is to secure the information.
• The Information Technology (IT) Community: This Community supports the objectives of a business by providing IT support and supply to the business needs. It includes IT professional who provide information technologies and supply other resources.
The above three things are recommended by CH to I to hire a project manager who has security skills in order to achieve a desired objective with the help of various activities and it helps in accomplishing of tasks easily.
close menu
Management of Information Security 4th Edition by Michael Whitman ,Herbert Mattord
cross icon