wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

File Allocation Methods

Blog banner

semaphores in os

Blog banner

Why is online marketing is important in current scenario

Blog banner

A book review

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Making Money through Instagram

Blog banner

INSTAGRAM

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Music helps reduce stress

Blog banner

Student Grade Calculator in LISP

Blog banner

Bit Coins

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

A BLOG ON MYSQL

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Compromising Mobile Platforms

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Fault tolerance

Blog banner

From Model Mistakes to Metrics

Blog banner

Uniprocessor Scheduling

Blog banner

Paid Email

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Cloud Computing

Blog banner

Steganography and Steganalysis

Blog banner

Android Flashlight Application

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Kernel in Operating System

Blog banner

Save Environment

Blog banner

Natural Language Processing(NLP)

Blog banner

Memory Management

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

I Personally

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Modern operating systems (OS)

Blog banner

Disk scheduling

Blog banner

Dudhasagar waterfall ?

Blog banner

Modern Operating system

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner