wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Hosting basics

Blog banner

Linux -V Server Virtual Machine

Blog banner

Deadlock Prevention

Blog banner

Corporate Discipline.

Blog banner

Types of E-Commerce

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

What is Virtual Memory

Blog banner

Subnet Masking

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Impact of social media on the human life

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Malware Defense

Blog banner

Types of OS

Blog banner

Cache memory

Blog banner

Data Lake

Blog banner

INTERNET SECURITY

Blog banner

THE ACTORS LIFE

Blog banner

Spotify

Blog banner

Im Photographer

Blog banner

undefined

Blog banner

BITCOIN WALLET

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

IoT Evolution

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

K-means use cases

Blog banner

A Deep Dive

Blog banner

STARVATION

Blog banner

What is Internet

Blog banner

Balance

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

R Programming

Blog banner

SQL Injection

Blog banner

Google App Engine

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Ola

Blog banner

Elements and Principles of Photography

Blog banner

ProofHub

Blog banner