2 cissp ® Official Study Guide Eighth Edition


Know how to implement security awareness training and education



Download 19,3 Mb.
Pdf ko'rish
bet102/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   98   99   100   101   102   103   104   105   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know how to implement security awareness training and education.
Before actual train-
ing can take place, awareness of security as a recognized entity must be created for users. 
Once this is accomplished, training, or teaching employees to perform their work tasks and 
to comply with the security policy, can begin. All new employees require some level of train-
ing so they will be able to comply with all standards, guidelines, and procedures mandated 
by the security policy. Education is a more detailed endeavor in which students/users learn 
much more than they actually need to know to perform their work tasks. Education is most 
often associated with users pursuing certification or seeking job promotion.
Understand how to manage the security function.
To manage the security function, an 
organization must implement proper and sufficient security governance. The act of per-
forming a risk assessment to drive the security policy is the clearest and most direct exam-
ple of management of the security function. This also relates to budget, metrics, resources, 
information security strategies, and assessing the completeness and effectiveness of the 
security program.
Know the six steps of the risk management framework.
The six steps of the risk manage-
ment framework are: Categorize, Select, Implement, Assess, Authorize, and Monitor.
Written Lab
1.
Name six different administrative controls used to secure personnel.
2.
What are the basic formulas used in quantitative risk assessment?
3.
Describe the process or technique used to reach an anonymous consensus during a 
qualitative risk assessment.
4.
Discuss the need to perform a balanced risk assessment. What are the techniques that 
can be used and why is this necessary?


Review Questions 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   98   99   100   101   102   103   104   105   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish