Menu

Important certifications / Eight types of people responsible for security

0 Comment

It mainly targets business processes instead of technology. The ISC is an international organization that provides training and certification programs for professionals working in a wide variety of information security domains. In this scenario, this certification programs generally offer common principles for maintaining information security of business assets such as information systems or networks. Additionally, these certification programs are designed to encourage security professionals to learn about international standards regarding information security. Up till now, ISC has provided certifications to thousands of employees working in government and private organizations. In addition, two most important security certifications offered by ISC are known as: Certified information systems security professional (CISSP) System Security Certified Practitioner (SSC) Though, the above mentioned security certification programs provide adequate support for the professionals however there are a large number of other security certifications (Merkow, 2006). For instance, Cisco (a well-known IT firm) has designed a wide variety of network security certification programs for IT professionals and organizations. … These certifications are suitable for information security professionals (Cisco, 2013. Bastien, 2003). In the same way, GIAC offers a certification program named as GIAC Information Security Professional (GISP), which is suitable for those information security Professionals that want to fill the gaps in their understanding of technical information security experts who work as system or network administrators. In fact this certification program can help them get the knowledge of the practical implementations of the Common Body of Knowledge. In addition, this program is also suitable for those business and project managers who consider information security further than straightforward concepts and terminology. In fact, this certification program is suitable for all those people who are new to information security however they have some knowledge of computer networking and information systems. In this scenario, this certification can also be used as a self-determining evaluation of their mastery of the (ISC) Common Body of Knowledge (Merkow, 2006, p. 67. GIAC, 2013). References Bastien, G. (2003, October 31). The Cisco Certified Security Professional. Retrieved March 10, 2013, from Cisco Press: http://www.ciscopress.com/articles/article.asp?p=101657 Cisco. (2013). Security Training. Retrieved March 07, 2013, from http://www.cisco.com/web/learning/le31/le29/learning_recommended_training09186a00800b4a87.html GIAC. (2013). GIAC Information Security Professional (GISP). Retrieved March 03, 2013, from http://www.giac.org/certification/information-security-professional-gisp Merkow. (2006). Information Security: Principles And Practices. New Delhi: Dorling Kindersley. Essay 2 Question 2: Describe the eight types of people responsible for security in an