Wednesday, August 28, 2019
Computer sciences and Information technology Essay
Computer sciences and Information technology - Essay Example What functions constitute a complete information security program? Network security administration, responses to incidents,, management of risks, measurement, centralized authentication, system security administration, assessment of legal claims, coaching, susceptibility assessment, testing systems, goals and adherence. What is the typical size of the security staff in a small organization? A medium sized organization? A large organization? A very large organization? The smallest has one fulltime and one or two assistants The second one is medium sized with one fulltime and two or three assistants Thirdly it is the large one with one of two fulltime admins, sixteen assistants and three to four technicians Lastly it is the large size. The large size has twenty full time admins and forty assistants. Where can an organization place the information security unit? Where should (and shouldnÃ¢â¬â¢t) it be placed? Different organizations have different locations and cite advantages and dis advantages for each location. The best locations are; insurance and risk management, information technology, legal department, operations or administrative services. Locations not advisable include accounting and finance, internal auditing, security, help desk and facilities management. The chain of command as well as recourse allocation is critical for a working placement.