1/17
"Good IT Security is often based around standards"
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
IT environment
consists of a multitude of hardware, network and software components
IT infrastructure
can be on premises; in the cloud or on a hybrid platform that integrates both
IT managers
monitor and govern IT systems to ensure they’re always available and function reliably
Determining business requirements for IT systems
Managing IT budgets and costs
Monitoring safety and compliance
Controlling system and network security
Implementing new software, hardware, and data systems
Providing technical or help desk support
IT Security Management (ITSM)
refers to the monitoring and administration of an organization’s information technology systems that are used to secure their information and data
intends to guarantee the Confidentiality, Integrity, and Availability of an organization’s data, information and IT services
IT Security Management Sub-Processes
Designing security controls
Security testing
Managing security incidents
Security review
Designing security controls
To guarantee the CIA of an organization’s data
Security Testing
All security mechanisms are subjected to regular testing
Managing security incidents
To identify and fight intrusions and attacks and also to minimize damages incured
Security review
To review whether the safety measures and processes are still in accordance with risk perceptions
IT Security Management Roles and Position
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Chief Information Officer (CIO)
Determines IT strategies and goals for the business and ensure they’re implemented
Many believe their roles will evolve in the next two to three years
Implements meaningful digital change through the creation of new tools, solutions, and business models
Chief Information Security Officer (CISO)
a senior-level executive who oversees an organization’s information, cyber, and technology security
CIO
generalists
CISO
focused on security
Other Related Positions
Security Administrator
Cloud Security Manager
Threat Intelligence Manager
Security Administrator
responsible for the day-to-day management of security technology systems
They install, administer, and troubleshoot an organization’s security solutions, ensuring that the infrastructure is protected against unauthorized access or compromise
Cloud Security Manager
reflects the shift towards cloud-based infrastructure
Threat Intelligence Manager
focusing or proactive identification and mitigation of cyber threats