StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Important certifications / Eight types of people responsible for security - Research Paper Example

Cite this document
Summary
Important certifications / Eight types of people responsible for security Important certifications / Eight types of people responsible for security Author Author’s Affiliation Date Essay 1 Question 1: What are some of the most important certification programs available to network security professionals?…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Important certifications / Eight types of people responsible for security
Read Text Preview

Extract of sample "Important certifications / Eight types of people responsible for security"

Download file to see previous pages

It mainly targets business processes instead of technology. The ISC is an international organization that provides training and certification programs for professionals working in a wide variety of information security domains. In this scenario, this certification programs generally offer common principles for maintaining information security of business assets such as information systems or networks. Additionally, these certification programs are designed to encourage security professionals to learn about international standards regarding information security.

Up till now, ISC has provided certifications to thousands of employees working in government and private organizations. In addition, two most important security certifications offered by ISC are known as: Certified information systems security professional (CISSP) System Security Certified Practitioner (SSC) Though, the above mentioned security certification programs provide adequate support for the professionals however there are a large number of other security certifications (Merkow, 2006).

For instance, Cisco (a well-known IT firm) has designed a wide variety of network security certification programs for IT professionals and organizations. . These certifications are suitable for information security professionals (Cisco, 2013; Bastien, 2003). In the same way, GIAC offers a certification program named as GIAC Information Security Professional (GISP), which is suitable for those information security Professionals that want to fill the gaps in their understanding of technical information security experts who work as system or network administrators.

In fact this certification program can help them get the knowledge of the practical implementations of the Common Body of Knowledge. In addition, this program is also suitable for those business and project managers who consider information security further than straightforward concepts and terminology. In fact, this certification program is suitable for all those people who are new to information security however they have some knowledge of computer networking and information systems. In this scenario, this certification can also be used as a self-determining evaluation of their mastery of the (ISC) Common Body of Knowledge (Merkow, 2006, p.

67; GIAC, 2013). References Bastien, G. (2003, October 31). The Cisco Certified Security Professional. Retrieved March 10, 2013, from Cisco Press: http://www.ciscopress.com/articles/article.asp?p=101657 Cisco. (2013). Security Training. Retrieved March 07, 2013, from http://www.cisco.com/web/learning/le31/le29/learning_recommended_training09186a00800b4a87.html GIAC. (2013). GIAC Information Security Professional (GISP). Retrieved March 03, 2013, from http://www.giac.org/certification/information-security-professional-gisp Merkow. (2006). Information Security: Principles And Practices.

New Delhi: Dorling Kindersley. Essay 2 Question 2: Describe the eight types of people responsible for security in an

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Important certifications / Eight types of people responsible for Research Paper”, n.d.)
Important certifications / Eight types of people responsible for Research Paper. Retrieved from https://studentshare.org/information-technology/1470664-important-certifications-eight-types-of-people
(Important Certifications / Eight Types of People Responsible for Research Paper)
Important Certifications / Eight Types of People Responsible for Research Paper. https://studentshare.org/information-technology/1470664-important-certifications-eight-types-of-people.
“Important Certifications / Eight Types of People Responsible for Research Paper”, n.d. https://studentshare.org/information-technology/1470664-important-certifications-eight-types-of-people.
  • Cited: 0 times

CHECK THESE SAMPLES OF Important certifications / Eight types of people responsible for security

The Information Technology in Terms of Security for the Institution

The team of running the organization is responsible for the security of the organization.... After this, the receptionist responsible for the visitor feeds information into the database and includes data about the purpose of the visit.... The paper "The Information Technology in Terms of security for the Institution" concerns the rubrics associated with effective organizational management is vital for the effectiveness of the medical office.... Exterior security from the Office The medical institution is to be named St....
15 Pages (3750 words) Assignment

Sarbanes Oxley and its Influence on the Finance and Information Technology

Subject to direct SEC supervision, this body also is responsible for disciplinary action--everything from investigation to significant fines--against any company found in noncompliance with the Act.... Although not specifically mandated by Sarbanes-Oxley, many companies are requiring certifications of financial results by their division presidents, department heads, and other senior management in an effort to comply with corporate governance and controls....
22 Pages (5500 words) Coursework

Timber Certification in the Building Industry

It will be important through interviews to obtain whether certification is fully understood or whether consumer's and merchant's tend to take heed of what certification means to them and the forestry industry in general; or, if there is a lack of understanding by both parties of what certification means.... It will be important through interviews to obtain whether certification is fully understood or whether consumer's and merchant's tend to take heed of what certification means to them and the forestry industry in general; or, if there is a lack of understanding by both parties of what certification means....
43 Pages (10750 words) Dissertation

MHE509 Emergency Planning and Methodology Module 3 Case

On March 1, 2003, FEMA became part of the Department of Homeland security (DHS).... Based on the statements presented above, do you believe that the new Department clearly recognizes the importance of local government in responding to and controlling small to moderate size disasters Please justify your position The US Department of Homeland security (DHS) employs approximately 180,000 people.... The department develops a comprehensive overview of American strategic interests and objectives for the security strategy....
4 Pages (1000 words) Essay

Managing information security risks in global financial institutions

hellip; The dissertation looks forward to answer the numerous issues associated with the Information security risk and also provide Risk management strategies that the financial institutions can implement in The management of Information security Risks and to implement various methodologies to mitigate the security risks is a growing challenge in the filed of Information technology.... The battle is on for finding out the efficient ways and design methodologies that can analyze the security risks and implement the appropriate mitigation solutions....
60 Pages (15000 words) Essay

The Development Information Security

For SMEs, there is an increased need for security framework in order to ensure a reliable and secure IT infrastructure.... It not only defines a particular security program in order to provide a foundation for security system but also satisfies particular needs of the organization.... This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues....
25 Pages (6250 words) Essay

Threats to Human Health: Shellfish Farming

This waste results from Styrofoam breakdown, plastic string, plastic trays, plastic tubing (for growing shellfish), netting and other types of equipment.... These operations produce large amounts of debris from Styrofoam breakdown, plastic string, plastic trays, plastic tubing (for growing shellfish), netting and other types of equipment.... Effects of industrial operations in or near residential areas: In the past, shellfish farms were owned and operated by the local people....
8 Pages (2000 words) Term Paper

Types and Categories of Threats to IT Systems

This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system.... hellip; CSSLP is the newest type of certification that ensures security is maintained throughout the software lifecycle.... It has seven domains that ensure security is highly maintained.... In such a case, security should be tightened on system access.... Storing passwords should be done in an encrypted way to ensure their security....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us