Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
bartleby

Concept explainers

Expert Solution & Answer
100%
Book Icon
Chapter 1, Problem 1RQ

Explanation of Solution

List of communities of interest that engage in an organization’s effort:

  • InfoSec Community (InfoSec managers and professionals):
  • This community protects the organizations information assets from the many threats they face.
  • InfoSec Community includes a risk manager or the CISO (Chief Information Security Officer).
  • Example:
  • This community comprises of the IT professionals, CISO and managers who bear the responsibility is to secure the information.
  • Information technology community (InfoSec technology managers and professionals):
  • This community supports the business objectives of the organization by supplying and supporting IT that is appropriate to the organizations need.
  • Information technology community includes a systems administrator or the CIO (chief information officer).
  • Example:
  • This community consists of IT professionals, CIO and managers who act as providers of information technologies and also supply other resources.
  • General business community (nontechnical managers and professionals):
  • This community articulates and communicates organizational policy and objectives and allocates resources to the other group.
  • General business community includes the CEO or the Director of Human Resources.
  • Example:
  • This community includes non-IT professional, users and managers.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
(a). Consider that you are working as Data Analyst in an organization. The HR department needs you to carry out following operation on existing list of 10 employees name (you can assume 10 names in a list here).  Split the list into two sub-list namely subList1 and subList2, each containing 5 names.  A new employee (assume the name “Kriti Brown”) joins, and you must add that name in subList2.    Remove the second employee's name from subList1.    Merge both the lists.    Assume there is another list salaryList that stores salary of these employees. Give a rise of 4% to every employee and update the salaryList.     Sort the SalaryList and show top 3 salaries.    Write the Python code and output for the same.  (b). Design a program such that it converts a sentence into wordlist. Reverse the wordlist then. Write the code and output for the same.  Note: The code and its output must be explained technically. The explanation can be provided before or after the code, or in the form of…
Jelaskan perbedaan antara negasi, konjungsi, dan disjungsi dalam logika proposisi.
Perform the analysis workflow of the Chocoholics Anonymous product described in Appendix A.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning