This program provides the necessary step by step approach and methodology for systematically evaluating an information system’s security.
At the end of this course the participants will be able to:
- Know the information as a source of competitive advantage
- Know the needs for Decision Making
- Limit Information Access
- Make a Systematic evaluation of information system security.
- IT Practitioners
- Cybersecurity Staff
- Practical Issues – The Security Situation
- Security Strategic Issues
- Business Mapping of Operations to Identify Security Risks – Flow Charts
- How Secure are Your Computer Security Fraud Prevention Practices?
- How safe is your computer system from Viruses, hacking, and fraud?
Unit 3: Analyzing:
- Do you have a problem?
- How serious is it?
- What should you do?
- How to evaluate the risk?
- How to implement controls?
- Methodology for:
- How to identify information assets and controls?
- How to quantify risks, likely damage causes for concern?
- To Understand the responses to any threat know which to use.
- Check your IT infrastructure – Identify weak links
- Review the success of key staff members in implementing controls
- Clarify your vulnerability to outsiders and staff – including providing them an Action Plan to Preserve Data Security on their Systems and Work Methods
- Planning the Security System
- Information Technology Security Standards Adoption
- Implementing Computer Security Improvements