Security Governance + Types of Governance Structures + Understanding Policy Documents

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

4 Terms

1
New cards

Security Governance

programs are the sets of procedures and controls put in place to allow an organization to effectively direct it’s work

2
New cards

Centralized governance

models use a top-down approach where a central authority creates policies and standards, which are then enforced throughout the organization

3
New cards

Decentralized governance models

use a bottom-up approach, where individual business units are delegated the authority to achieve cybersecurity objectives and then may do so in the manner they see fit

4
New cards

An organization’s information security policy framework

contains a series of documents designed to describe the organization’s cybersecurity program