The Information Systems Security Officer's Guide
eBook - ePub

The Information Systems Security Officer's Guide

Establishing and Managing a Cyber Security Program

Gerald L. Kovacich

  1. 360 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

The Information Systems Security Officer's Guide

Establishing and Managing a Cyber Security Program

Gerald L. Kovacich

Book details
Book preview
Table of contents
Citations

About This Book

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.

The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

  • Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation
  • Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization
  • Written in an accessible, easy-to-read style

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is The Information Systems Security Officer's Guide an online PDF/ePUB?
Yes, you can access The Information Systems Security Officer's Guide by Gerald L. Kovacich in PDF and/or ePUB format, as well as other popular books in Negocios y empresa & Gestión de la información. We have over one million books available in our catalogue for you to explore.

Information

Year
2016
ISBN
9780128023792
Section II
The Duties and Responsibilities of a Cyber Security Officer

Introduction

Section I provided a basic understanding of the external world, with all its many threats to information and information systems—all of which have a direct bearing on the cyber security officer and his or her job. Section II provides a more internal, business focus on the world of the cyber security officer.
Section II begins with the identification of the position, duties, and responsibilities of the corporation cyber security officer. It progresses through a discussion of:
• establishing and managing a cyber security program;
• strategic, tactical, and annual plans;
• developing and managing a cyber security organization and its functions;
• measuring cyber security costs, failures, and successes through metrics management;
• supporting the investigative staff; and
• an overview of the cyber security program in a nation-state’s national security environment.
Chapter 6

The Cyber Security Officer’s Position, Duties, and Responsibilities

Abstract

The objective of this chapter is to define the role that the cyber security officer will play in a corporation or government agency. In this case, it is the role of the cyber security officer in an international corporation. The duties and responsibilities of a cyber security officer vary depending on the place of employment. However, in this case, we are assuming the cyber security officer has the perfect position because it is one all cyber security officers should strive to attain in order to “do it right the first time.”

Keywords

Cellular phones; Cyber security officer; Management blank check; Mission statements; Project management; Quality statements; Risk management; Vision statements
Responsible, who wants to be responsible? Whenever something bad happens, it’s always, who’s responsible for this?
Jerry Seinfeld1
Chapter Objective
The objective of this chapter is to define the role that the cyber security officer will play in a corporation or government agency. In this case, it is the role of the cyber security officer in an international corporation. The duties and responsibilities of a cyber security officer vary depending on the place of employment. However, in this case, we are assuming the cyber security officer has the perfect position because it is one all cyber security officers should strive to attain in order to “do it right the first time.”

Introduction

The role of the cyber security officer is more demanding now than ever before, owing to advances in technology, especially in miniaturization and mobility; more national and global network interfaces to his or her corporation; and more sophisticated attacks. The challenges have never been greater but they will be over time.

Where It Began and Its Evolution and Revolution

We began with only physical security, as after all, the ENIAC and other computers did not connect to the world. A guard, a paper-authorized personnel access list, an alarm, and such were all that were needed in those early days. But as the computer evolved over time, so did the profession of the cyber security officer.
The security profession at that time was primarily made up of retired or former law enforcement or military personnel, who had no interest in computer security. They knew physical security, investigations, and personnel security. This new thing called a computer was best left to the computer scientists and engineers.
As systems evolved, so did the departments responsible for their support. Departments that were once engineering departments perhaps became information resource management departments and later became known as information technology (IT) departments. The protection of this new technology stayed with the IT people. However, the computer security positions within the IT departments also evolved.
As the microprocessor and its related technology developed, the once-separated telecommunications and computer staffs began their integration. Consequently, the “computer security” profession began to also consider the protection of information as it flowed through telecommunications links. As the Internet evolved, the need for protecting information as it was displayed, such as on Web sites, also became an important task for those responsible for protecting the hardware, software, and firmware.
Information and related systems are some of a business’s most valuable assets, one can argue, second only to the employees. In fact, although no one in management within a business would ever prioritize assets to place information and systems above the employees—at least not publicly—people can always be replaced, and replaced at less cost and adverse impact to the business, than trade secrets and information networks. However, that will probably remain an unspoken issue because of the sensitive nature of valuing machines over humans.
When we think about it, though, information really is business’s No. 1 asset. After all, employees can be terminated, even replaced by computers, and the business survives. In fact, profits may even increase because of lower labor costs. However, eliminate an intranet or national or global information infrastructure connection and the business could be lost.
Today, the cyber security officer position is generally still part of the IT department’s function. Now, the cyber security officer is responsible for the protection of information and the systems that store, process, transmit, and display that information. The cyber security officer profession has matured into a separate profession, and in most large-to-medium companies, it is more than a part-time job or additional responsibility these days. In smaller businesses it remains mostly a part-time job or is outsourced with other security-related functions.
Information systems of various types, such as cellular phones, notebook computers, personal digital assistants, and fax machines, are all used to process, store, transmit, and display information. These devices are becoming more and more integrated into one device. Couple this phenomenon with the hard copies being produced, and one finds that information may be protected on an intranet but leaked through a cellular phone or printed on paper and then taken out of the business’s facilities.
Case Study
Cellular phones are becoming smaller and smaller. Digital cameras are also being installed into these cellular phones. Since management wants their employees to have the latest high-technology devices that help support the business in the most efficient and effective way possible, employees are issued cellular phones. The cellular phones with digital cameras integrated into them allow employees to digitally send photographs as part of their business communications processes. It also provides the opportunity for the employee to photograph sensitive documents, facilities, and such and send the photos directly to unauthorized sources. Thus, there is now another method of performing “Netspionage” (network-enabled espionage). As a cyber security officer, do you have policies, etc., in place to mitigate this new threat?
The cyber security officer position must evolve to be responsible not only for protecting information and systems related to, or the responsibility of, the IT department, but also for protecting all of the business’s information assets. It is ridiculous to have the business security professional responsible f...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Author
  7. Preface
  8. Acknowledgments
  9. Introduction
  10. Section I. The Working Environment of the Cyber Security Officer
  11. Section II. The Duties and Responsibilities of a Cyber Security Officer
  12. Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer
  13. Index
Citation styles for The Information Systems Security Officer's Guide

APA 6 Citation

Kovacich, G. (2016). The Information Systems Security Officer’s Guide (3rd ed.). Elsevier Science. Retrieved from https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf (Original work published 2016)

Chicago Citation

Kovacich, Gerald. (2016) 2016. The Information Systems Security Officer’s Guide. 3rd ed. Elsevier Science. https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf.

Harvard Citation

Kovacich, G. (2016) The Information Systems Security Officer’s Guide. 3rd edn. Elsevier Science. Available at: https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Kovacich, Gerald. The Information Systems Security Officer’s Guide. 3rd ed. Elsevier Science, 2016. Web. 15 Oct. 2022.