wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Binary Search Tree (BST) in Data Structure

Blog banner

Evolution of the Microprocesor

Blog banner

Yahoo! mail

Blog banner

Why we should do reading

Blog banner

The art of being alone

Blog banner

SQL Injection

Blog banner

Social Media Sentiment Analysis

Blog banner

Segmentation and paging concept

Blog banner

Tableau

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

To-Do List In LISP

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Creating Digitally Signed Document

Blog banner

Buffering

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

LISP - Library Management System

Blog banner

What is OS and its overview

Blog banner

Operating system

Blog banner

Financial Stress and Mental Health

Blog banner

Advantage of freedom

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Deadlocks

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Types of Malware in Cyber Security

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Objectives and Functions of Operating System

Blog banner

Information of meesho company

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

security requirements for safe e-payment

Blog banner

Internet of Things

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Deadlock

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Multicore CPUs

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

KAHAWA TEA

Blog banner

The War With Cold On Earth

Blog banner