Information Security Management and the Human Aspect in Organizations

The methods and techniques that businesses employ to safeguard information are referred to as information security. This involves setting up security measures to prohibit unauthorized users from accessing sensitive data. Network and infrastructure security, testing, and auditing are just a few of the many topics covered by the expanding and changing subject of information security. Sensitive data is protected by information security from unauthorized actions such as examination, alteration, recording, interruption, or destruction. The objective is to guarantee the security and privacy of sensitive data, including financial information, intellectual property, and account information for customers. Physical security, intrusion prevention, data encryption, and network security are only a few of the many topics covered by the large discipline of information security. Information assurance, which guards against dangers like natural catastrophes and server outages, is also closely tied to it. A crucial step in preventing and reducing security threats is developing an efficient security strategy and adopting measures to verify compliance. The rapid advancement of technology frequently causes security precautions to be compromised.

Security project managers oversee security initiatives that are in line with a company’s objectives and requirements. The project managers create the plans for the projects related to security management. Engineers, computer programmers, system designers, and electricians are some of the team members they oversee. They create and put into action security protocols, policies, and procedures. In order to assure security operations and keep an eye on their spending, it is also their responsibility to manage the corporate budget. Moreover, project managers are in charge of overseeing expenditures and managing security operations budgets. They also coordinate workers to respond to crises and alarms and produce reports on security status for management.

The rules and regulations of the countries where a firm conducts business are constantly interacting with information security. Global data protection laws govern how businesses can gather, keep, and utilize consumer data with the goal of enhancing the privacy of personal information. Data privacy is primarily concerned with how the data is handled and utilized and focuses on personally identifiable information (PII). System certification is a formal process for thoroughly evaluating and documenting information system security protections in a specific environment using both technical and nontechnical standards (the TCSEC). As stated in the certification report, accreditation is a formal, written clearance for the use of a certain system in a particular setting. Typically, a senior executive or Designated Approving Authority will give accreditation (DAA). The military and administration of the United States employ the term DAA. A commanding officer or other top official is often a DAA. When modifications are made to the system or environment, system certification and accreditation must be updated. They must also be routinely re-validated, which normally takes place every three years.

The article that was chosen is by Stewart and Jürjens (2017). The purpose of this study is to persuade management boards to acknowledge that personnel management plays a significant role in information security management. Therefore, the problems related to staff must be effectively resolved, especially in firms where data are a vital asset. The article demonstrates the importance of human resources in information security industry and can be used to build an effective management. As a cybersecurity professional, the approach on focusing on employees’ well-being and productivity can help me to manage the security team without any problems.

References

Stewart, H., & Jürjens, J. (2017). Information security management and the human aspect in organizations. Information & Computer Security.

Removal Request
This essay on Information Security Management and the Human Aspect in Organizations was written by a student just like you. You can use it for research or as a reference for your own work. Keep in mind, though, that a proper citation is necessary.
Request for Removal

You can submit a removal request if you own the copyright to this content and don't want it to be available on our website anymore.

Send a Removal Request