wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Information Technology In E- Commerce

Blog banner

Importance of business process documentation

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Friendship

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Getting into anime My anime suggestions

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Power of words

Blog banner

Privacy in Social Media and Online Services

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Evolution of operating system

Blog banner

Synchronization

Blog banner

Memory management and virtual memory

Blog banner

COMMUNICATION

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

All you need to know about “On-page SEO”

Blog banner

Article on IT development trends

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Article on different management system

Blog banner

Old age lifestyle

Blog banner

Kernel in Operating System

Blog banner

Threads

Blog banner

Deadlock

Blog banner

E-learning

Blog banner

Understanding E-mail Servers

Blog banner

Virtual Memory

Blog banner

Artificial Intelligence (AI)

Blog banner

RAID - LEVELS OF RAID

Blog banner

Race Condition

Blog banner

Hacking

Blog banner

Have You Explored India Yet?

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Game via listing method

Blog banner

Objectives and Functions of Operating System

Blog banner

Capacity management in ITSM

Blog banner

Uniprocessor Scheduling

Blog banner

1.1 basic elements

Blog banner

Data Science & AI

Blog banner

Blog name

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Virtual Machine

Blog banner

Review on Recovering Deleted Files

Blog banner