The Information Systems Security Officer's Guide
eBook - ePub

The Information Systems Security Officer's Guide

Establishing and Managing a Cyber Security Program

Gerald L. Kovacich

  1. 360 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

The Information Systems Security Officer's Guide

Establishing and Managing a Cyber Security Program

Gerald L. Kovacich

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer.

The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

  • Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation
  • Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization
  • Written in an accessible, easy-to-read style

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es The Information Systems Security Officer's Guide un PDF/ePUB en línea?
Sí, puedes acceder a The Information Systems Security Officer's Guide de Gerald L. Kovacich en formato PDF o ePUB, así como a otros libros populares de Negocios y empresa y Gestión de la información. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Año
2016
ISBN
9780128023792
Section II
The Duties and Responsibilities of a Cyber Security Officer

Introduction

Section I provided a basic understanding of the external world, with all its many threats to information and information systems—all of which have a direct bearing on the cyber security officer and his or her job. Section II provides a more internal, business focus on the world of the cyber security officer.
Section II begins with the identification of the position, duties, and responsibilities of the corporation cyber security officer. It progresses through a discussion of:
• establishing and managing a cyber security program;
• strategic, tactical, and annual plans;
• developing and managing a cyber security organization and its functions;
• measuring cyber security costs, failures, and successes through metrics management;
• supporting the investigative staff; and
• an overview of the cyber security program in a nation-state’s national security environment.
Chapter 6

The Cyber Security Officer’s Position, Duties, and Responsibilities

Abstract

The objective of this chapter is to define the role that the cyber security officer will play in a corporation or government agency. In this case, it is the role of the cyber security officer in an international corporation. The duties and responsibilities of a cyber security officer vary depending on the place of employment. However, in this case, we are assuming the cyber security officer has the perfect position because it is one all cyber security officers should strive to attain in order to “do it right the first time.”

Keywords

Cellular phones; Cyber security officer; Management blank check; Mission statements; Project management; Quality statements; Risk management; Vision statements
Responsible, who wants to be responsible? Whenever something bad happens, it’s always, who’s responsible for this?
Jerry Seinfeld1
Chapter Objective
The objective of this chapter is to define the role that the cyber security officer will play in a corporation or government agency. In this case, it is the role of the cyber security officer in an international corporation. The duties and responsibilities of a cyber security officer vary depending on the place of employment. However, in this case, we are assuming the cyber security officer has the perfect position because it is one all cyber security officers should strive to attain in order to “do it right the first time.”

Introduction

The role of the cyber security officer is more demanding now than ever before, owing to advances in technology, especially in miniaturization and mobility; more national and global network interfaces to his or her corporation; and more sophisticated attacks. The challenges have never been greater but they will be over time.

Where It Began and Its Evolution and Revolution

We began with only physical security, as after all, the ENIAC and other computers did not connect to the world. A guard, a paper-authorized personnel access list, an alarm, and such were all that were needed in those early days. But as the computer evolved over time, so did the profession of the cyber security officer.
The security profession at that time was primarily made up of retired or former law enforcement or military personnel, who had no interest in computer security. They knew physical security, investigations, and personnel security. This new thing called a computer was best left to the computer scientists and engineers.
As systems evolved, so did the departments responsible for their support. Departments that were once engineering departments perhaps became information resource management departments and later became known as information technology (IT) departments. The protection of this new technology stayed with the IT people. However, the computer security positions within the IT departments also evolved.
As the microprocessor and its related technology developed, the once-separated telecommunications and computer staffs began their integration. Consequently, the “computer security” profession began to also consider the protection of information as it flowed through telecommunications links. As the Internet evolved, the need for protecting information as it was displayed, such as on Web sites, also became an important task for those responsible for protecting the hardware, software, and firmware.
Information and related systems are some of a business’s most valuable assets, one can argue, second only to the employees. In fact, although no one in management within a business would ever prioritize assets to place information and systems above the employees—at least not publicly—people can always be replaced, and replaced at less cost and adverse impact to the business, than trade secrets and information networks. However, that will probably remain an unspoken issue because of the sensitive nature of valuing machines over humans.
When we think about it, though, information really is business’s No. 1 asset. After all, employees can be terminated, even replaced by computers, and the business survives. In fact, profits may even increase because of lower labor costs. However, eliminate an intranet or national or global information infrastructure connection and the business could be lost.
Today, the cyber security officer position is generally still part of the IT department’s function. Now, the cyber security officer is responsible for the protection of information and the systems that store, process, transmit, and display that information. The cyber security officer profession has matured into a separate profession, and in most large-to-medium companies, it is more than a part-time job or additional responsibility these days. In smaller businesses it remains mostly a part-time job or is outsourced with other security-related functions.
Information systems of various types, such as cellular phones, notebook computers, personal digital assistants, and fax machines, are all used to process, store, transmit, and display information. These devices are becoming more and more integrated into one device. Couple this phenomenon with the hard copies being produced, and one finds that information may be protected on an intranet but leaked through a cellular phone or printed on paper and then taken out of the business’s facilities.
Case Study
Cellular phones are becoming smaller and smaller. Digital cameras are also being installed into these cellular phones. Since management wants their employees to have the latest high-technology devices that help support the business in the most efficient and effective way possible, employees are issued cellular phones. The cellular phones with digital cameras integrated into them allow employees to digitally send photographs as part of their business communications processes. It also provides the opportunity for the employee to photograph sensitive documents, facilities, and such and send the photos directly to unauthorized sources. Thus, there is now another method of performing “Netspionage” (network-enabled espionage). As a cyber security officer, do you have policies, etc., in place to mitigate this new threat?
The cyber security officer position must evolve to be responsible not only for protecting information and systems related to, or the responsibility of, the IT department, but also for protecting all of the business’s information assets. It is ridiculous to have the business security professional responsible f...

Índice

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Author
  7. Preface
  8. Acknowledgments
  9. Introduction
  10. Section I. The Working Environment of the Cyber Security Officer
  11. Section II. The Duties and Responsibilities of a Cyber Security Officer
  12. Section III. The Global, Professional, and Personal Challenges of a Cyber Security Officer
  13. Index
Estilos de citas para The Information Systems Security Officer's Guide

APA 6 Citation

Kovacich, G. (2016). The Information Systems Security Officer’s Guide (3rd ed.). Elsevier Science. Retrieved from https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf (Original work published 2016)

Chicago Citation

Kovacich, Gerald. (2016) 2016. The Information Systems Security Officer’s Guide. 3rd ed. Elsevier Science. https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf.

Harvard Citation

Kovacich, G. (2016) The Information Systems Security Officer’s Guide. 3rd edn. Elsevier Science. Available at: https://www.perlego.com/book/1832682/the-information-systems-security-officers-guide-establishing-and-managing-a-cyber-security-program-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Kovacich, Gerald. The Information Systems Security Officer’s Guide. 3rd ed. Elsevier Science, 2016. Web. 15 Oct. 2022.