wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Introduction to GIS

Blog banner

Amazon

Blog banner

Kernel in Operating System

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Modern operating systems (OS)

Blog banner

I/O buffer and its techniques

Blog banner

Proof-of-Stake (PoS)

Blog banner

10 Types of Friends in every friend group

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Operating system

Blog banner

Scala - a programming tool

Blog banner

Dudhasagar waterfall ?

Blog banner

Service stratergy principles

Blog banner

MEMORY HIERARCHY

Blog banner

Earth with no trees

Blog banner

What is Minting & Mining

Blog banner

E-learning

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Different types of scam Fraud

Blog banner

EMAIL INVESTIGATION

Blog banner

Data Visualization in Decision-Making

Blog banner

KASHMIR TRIPS

Blog banner

Security Issues and Countermeasures

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Deadlock

Blog banner

Life lesson

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Modern operating system

Blog banner

Brain wash of social media

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

BENIFITS OF YOGA

Blog banner

Article on IT development trends

Blog banner

Hubspot

Blog banner

Cache Memory

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner