wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Business Intelligence v/s Big Data

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Privacy LAWs in IT

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Deadlock and Starvation

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Policies for Service Transition

Blog banner

Virtual memory

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Capacity management in ITSM

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Why we fail after giving 100% ?

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Blockchain Security Technique

Blog banner

Virtual Memory

Blog banner

SQL Injection

Blog banner

Service Transition Process in ITSM

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Uber

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Types of Big Data

Blog banner

Security in Cloud Computing

Blog banner

What are Virtual Machines

Blog banner

What is Virtual Memory

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

MENDELEY

Blog banner

Never give up

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Heart Fulness Meditation

Blog banner

A Journey By Train

Blog banner

URL vs Domain

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Business Engineering

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

security requirements for safe e-payment

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Excel records

Blog banner

IT RISK

Blog banner