wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Blog on health and fitness

Blog banner

Memory Management

Blog banner

USES OF WHATSAPP

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Cache Memory

Blog banner

John Titor: The Time Traveler

Blog banner

GraphQL

Blog banner

Indian Food

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Threat management

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Article on IT development trends

Blog banner

RAID

Blog banner

What is Minting & Mining

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Service design process in ITSM

Blog banner

PODIO

Blog banner

Windows Operating System

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Importance Of Yoga.

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Big Data Architecture

Blog banner

Modern Operating System - Khush bagaria

Blog banner

How to feel Happy everyday day

Blog banner

Article on different management system

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

IT Service Continuity Management

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Mumbai

Blog banner

File Management In OS

Blog banner

What is Virtual Memory

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Environmental Management using GIS

Blog banner

Cyber Forensics

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Emerging threats in cyber Forensics

Blog banner