What are the 3 groups/communities of interest involved in information security decisions?
What’s the role of management
to ensure that security strategies are properly planned and controlled.
What’s Management?
It’s achieving objectives using the available resources.
What’s a manager?
A manager is assigned to administrate resources and coordinate tasks, to achieve objectives.
What are the 3 managerial roles?
What’s the difference between leadership and management?
A leader leads by example to influence employees to accomplish objectives.
A manager is assigned to administrate resources and coordinate tasks, to achieve objectives.
3 behavioral types of leaders:
– The Autocratic: taking no account of other people’s wishes or opinions.
– The Democratic: taking into consideration other’s wishes or opinions.
– The Laissez-faire: let others operate according to their own laws.
2 basic approaches to management are:
– Traditional management theory (POSDC): Staffing/Directing.
– Popular management theory (POLC): more emphasis on leading than directing.
3 Categories of Planning:
– Strategic planning: 5+ Years.
– Tactical planning: 1 - 5 Years.
– Operational planning: day-to-day operations.
What’s “Governance”?
The practices of the management to achieve goals and manage risks.
5 steps to solving problems:
Unique functions of information security
management are known as the six P’s:
– Planning
– Policy
– Programs
– Protection
– People
– Project Management
“Policy” is:
guidelines for behavior in an organization.
3 general categories of policy:
– Enterprise information security policy (EISP)
– Issue-specific security policy (ISSP).
– System-specific policies (SysSPs)
3 examples of the many InfoSec plans are:
– incident response planning.
– disaster recovery planning.
– risk management planning.