Pitt IS 2820 - Developing Security Programs (21 pages)

Previewing pages 1, 2, 20, 21 of 21 page document View the full content.
View Full Document

Developing Security Programs



Previewing pages 1, 2, 20, 21 of actual document.

View the full content.
View Full Document
View Full Document

Developing Security Programs

20 views

Lecture Notes


Pages:
21
School:
University of Pittsburgh
Course:
Is 2820 - SECURITY MANAGEMENT

Unformatted text preview:

Principles of Information Security 5 1 Chapter 5 Developing Security Programs Chapter Overview Chapter 5 will explore the various organizational approaches to information security and provide an explanation of the functional components of the information security program Readers will learn how to plan and staff an organization s information security program based on its size and other factors as well as how to evaluate the internal and external factors that influence the activities and organization of an information security program As the topic of organizing the information security function is expanded upon the reader will learn how to identify and describe the typical job titles and functions performed in the information security program The chapter concludes with an exploration of the components of a security education training and awareness program and describes how organizations create and manage these programs Chapter Objectives When you complete this chapter you will be able to Recognize and understand the organizational approaches to information security List and describe the functional components of the information security program Determine how to plan and staff an organization s information security program based on its size Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed in the information security program Describe the components of a security education training and awareness program and understand how organizations create and manage these programs Set up Notes This chapter could be completed in a single class session if there is sufficient time to cover the material Unless the students have not had the opportunity to read the material in advance in some settings the textbooks are not made available until the first class meeting it may be prudent to have a general discussion of the topic with detailed lecture to



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Developing Security Programs and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Developing Security Programs and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?