wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Digital Forensics Challenges and Tools

Blog banner

Modern Operating System

Blog banner

Deadlock and starvation in operating system

Blog banner

Zoho

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Blockchain Security Technique

Blog banner

Memory Management

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Service transistion under difficult conditions

Blog banner

Love is in air.....

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

WORKFRONT SOFTWARE

Blog banner

Capacity management in ITSM

Blog banner

Starvation

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Linux Memory Management

Blog banner

Uniprocessor scheduling

Blog banner

Deming’s Process

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Virtual Machine

Blog banner

undefined

Blog banner

Booting Process In Operating System

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

An Overivew Of Cache Memory

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Service Operations in ITSM

Blog banner

Expert System In AI

Blog banner

Direct memory access (DMA)

Blog banner

Cryptanalysis tool

Blog banner

File system implementation

Blog banner

The Role of cryptography in cyber security

Blog banner

Security requirements for Safe E-Payments

Blog banner

Cache memory

Blog banner

About myself

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Social engineering in cyber security

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Virtual Memory

Blog banner