wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PPT methodology

profile
Neha Maurya
Aug 29, 2022
0 Likes
0 Discussions
145 Reads

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this. This drawing shows the basic elements and also coverage areas.

 

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let's understand these three elements individually.

 

People: This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

 

Policy: This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

 

Technology: This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.


Comments ()


Sign in

Read Next

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory Hierarchy

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Mobile Security

Blog banner

Music is life

Blog banner

My 1stNull Puliya session

Blog banner

Deadlocks

Blog banner

Short note on expert system

Blog banner

Cache memory

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Real time scheduling

Blog banner

Zomato (Income Sources)

Blog banner

Modern operating system

Blog banner

About myself

Blog banner

Deadlock

Blog banner

THE ACTORS LIFE

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

The evolution of OS

Blog banner

Who decides your overthinking, anyway?

Blog banner

Why am I never satisfied with my Life?

Blog banner

Memory management

Blog banner

ZOHO

Blog banner

Supervised and Unsupervised Learning

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Life of an army person

Blog banner

Hey Aryan here

Blog banner

5 Common Faults In Construction Tenders

Blog banner

My Favorite Country

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Types of Malware in Cyber Security

Blog banner

Virtual Memory

Blog banner

Service Operations in ITSM

Blog banner

Paging

Blog banner

Message Passing in OS

Blog banner

Memory management

Blog banner

Twisted world

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Microsoft powerpoint presentation

Blog banner

Smartsheet

Blog banner