Implementing an Information Assurance Awareness Program: A case study for the Twenty Critical Security Controls at Consulting Firm X for IT Personnel

نویسنده

  • Richard Carbone
چکیده

As a consultant within a large, growing, high-profile consulting firm, this challenge is interesting in terms of preventing potential future cyber-attacks. The organization supports a large number of sensitive US Government projects, including hosting or developing portals and applications as part of the work. Protecting this organization’s networks indirectly protects sensitive US Government networks as well. Consulting Firm X, known internally as the Firm, primarily supports clients in the public sector and many of the senior executives are retired senior government and military officials. This relationship has often caused the Firm negative publicity and public opinion among those who do not trust the US Government and its policies. Often, the Firm is the target of cyber-attacks. Therefore, the Firm must maintain a high level of Information Assurance preparedness and awareness in implementing security controls. IMPLEMENTING AN INFORMATION ASSURANCE AWARENESS PROGRAM 2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

Safe teleradiology: information assurance as project planning methodology

The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in t...

متن کامل

Analyzing the Role of Public Libraries Services in the Development of the Local Economy: Case Study of Kermanshah Province

Purpose: This study aimed to analyze the role of public libraries in the development of the local economy from the perspective of librarians working in public libraries of Kermanshah province in the current and desirable situation of public libraries. This study extracts the activities that the public library can do in the development of the local economy in the form of information and informat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015