wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Security Issues and Countermeasures

Blog banner

Virtual machine.

Blog banner

LISP - Library Management System

Blog banner

Understanding Regression Analysis

Blog banner

To-Do List In LISP

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

OS- Assignnment 1

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Technical SEO : Total Guide

Blog banner

Virtual memory

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Operating system

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Benefits of yoga and meditation

Blog banner

Social Engineering Attacks

Blog banner

Operating system evolution

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Twisted world

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Importance of Website

Blog banner

Life of an army person

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Deadlock and Starvation

Blog banner

Difference Between Classification And Clustering

Blog banner

Types of Malware in Cyber Security

Blog banner

OS Assignment-3

Blog banner

Firewall

Blog banner

Mail merge

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Capacity management in ITSM

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Guidelines for a low sodium diet.

Blog banner

Real time scheduling

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Fault Tolerance in an Operating System

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Data Structures

Blog banner