For each major information security job title covered in the chapter, list and describe the key qualifications and requirements for the position
1. What member of an organization should decide where the information security function belongs within the organizational structure? Why?
2. List and describe the options for placing the information security function within the organization. Discuss the advantages and disadvantages of each option. 620 Chapter 11 Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-300
3. For each major information security job title covered in the chapter, list and describe the key qualifications and requirements for the position.
4. What factors influence an organization’s decisions to hire information security professionals?
5. Prioritize the list of general attributes that organizations seek when hiring information security professionals. In other words, list the most important attributes first. Use the list you developed to answer the previous review question.
6. What are critical considerations when dismissing an employee? Do they change according to whether the departure is friendly or hostile, or according to which position the employee is leaving?
7. How do security considerations for temporary or contract employees differ from those for regular full-time employees?
8. What career paths do most experienced professionals take when moving into information security? Are other pathways available? If so, describe them.
9. Why is it important to use specific and clearly defined job descriptions for hiring information security professionals?
10. What functions does the CISO perform?
11. What functions does the security manager perform?
12. What functions does the security analyst perform?
13. What rationale should an aspiring information security professional use in acquiring professional credentials?
14. List and describe the credentials of the information security certifications mentioned in this chapter.
15. Who should pay for the expenses of certification? Why?
16. List and describe the standard personnel practices that are part of the information security function. What happens to these practices when they are integrated with information security concepts?
17. Why shouldn’t an organization give a job candidate a tour of secure areas during an interview?
18. List and describe the typical relationships that organizations have with temporary employees, contract employees, and consultants. What special security precautions must an organization consider for such workers, and why are they significant?
19. What is separation of duties? How can it be used to improve an organization’s information security practices?
20. What is job rotation, and what benefits does it offer an organization?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
