We as security professionals need to reduce risk, mitigate liability, ensure business continuity, reduce operating costs, comply with government and insurance regulations and future-proof your business. Security management is a broad topic which includes risk management, information security policies, procedures, standards, guidelines, baselines and security education. The objective of security program is to protect organization and its assets. Management tools such as information classification, risk assessment and risk analysis are used to identify threats, classify assets and to rate system vulnerabilities so that effective control can be implemented.

Earn Over $100K Average Annual Salary!

Caltech Cybersecurity BootcampExplore Program
Earn Over $100K Average Annual Salary!

Organizational Security Model or Framework

Organizational security model is a framework which is made of many components (logical, physical and administrative), procedures, processes and configurations that all work together to provide security level for the given system.

Information security or InfoSec

Infosec as it is known popularly is the term used to define the practice to protect the information from illegal access, use, disclosure, disruption, change, perusal, inspection, recording or destruction. This is a standard term that is used regardless of the form the data may take.
The following are the typical terms that we will hear when dealing with information security:

IT Security or Computer Security

IT Security, also known as Computer Security is defined as information security when applied to technology (Hardware and Software). We define a computer as any device or hardware with a processor and memory. IT security specialists are present in almost all major enterprise/ establishments due to the nature and value of the data within larger businesses. The IT security team is responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

Information Assurance

Information Assurance (IA) is the act of ensuring that data is not lost when grave issues arise. The issues which can be reason for loss of data can include but are not limited to the natural disasters, computer problem or error, physical theft of the hardware or software, or any other issue where data has the potential of being lost. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of the application and user data. It uses physical, technical and administrative controls to accomplish these tasks. While focused predominantly on information in digital form, the full range of IA encompasses not only digital but also analog or physical form. These protections apply to data in transit, both physical and electronic forms as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security.

Certified Information Systems Auditor (CISA)

CISA certification is meant for Information Technology professionals specifically in audit arena sponsored by ISACA, formerly the Information Systems Audit and Control Association. This particular certification is planned for those who audit, control, monitor and review an enterprise’s information technology and business systems. Candidates for the certification must meet requirements set by ISACA on educational qualification and professional experience.

Security policy

Security policy is the term used to describe as what it means to be a secure system, organization or component or entity. This policy addresses the constraints on actions taken by its members as well as constraints imposed on adversaries. Security policy for the given systems is the mechanism to address constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.

IT Security Incident Management

IT Security Incident Management can be defined as a process which tells us on the effectiveness of preparation by our information technology (IT) department or administrator to handle security incidents. In our experience many organizations will only learn to respond to security incidents after suffering attacks. After attack, incidents often become much more costly than needed. Proper incident response should be an integral part of the organization's overall security policy and risk mitigation strategy.

Network Security

Network security is the term often used for the requirements and policies adopted by a network team to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network service or resource.
Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned a Used ID and password or it could be any other information to authenticate and access to information and programs they are authorized to access. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Happy learning! We wish you good luck in your "CISA Certification Program" journey.

About the Author

Eshna VermaEshna Verma

Eshna writes on PMP, PRINCE2, ITIL, ITSM, & Ethical Hacking. She has done her Masters in Journalism and Mass Communication and is a Gold Medalist in the same. A voracious reader, she has penned several articles in leading national newspapers like TOI, HT, and The Telegraph. She loves travelling and photography.

View More
  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.