List four of the nine competencies needed to manage the IT strategic management function that are identified in the EBK.

What will be an ideal response?


1. Establish an IT security program to provide security for all systems, networks, and data that support the operations and business/mission needs of the organization
2. Integrate and align IT security, physical security, personnel security, and other security components into a systematic process to ensure that information protection goals and objectives are reached
3. Align IT security priorities with the organization's mission and vision, and communicate the value of IT security within the organization
4. Acquire and manage the necessary resources, including financial resources, to support IT security goals and objectives and reduce overall organizational risk
5. Establish overall enterprise information security architecture (EISA) by aligning business processes, IT software and hardware, local and wide area networks, people, operations, and projects with the organization's overall security strategy
6. Acquire and manage the necessary resources, including financial resources, for instituting security policy elements in the operational environment
7. Establish organizational goals that are in accordance with standards, procedures, directives, policies, regulations, and laws (statutes)
8. Balance the IT security investment portfolio based on EISA considerations and enterprise security priorities
9. Ensure that appropriate changes and improvement actions are implemented as required

Computer Science & Information Technology

You might also like to view...

The data in an Excel table are managed independently from any other data that lives on the same worksheet

Indicate whether the statement is true or false.

Computer Science & Information Technology

Match the forensic accounting case with its description

I. Adelphia A. Admitted to "loaning" $2.3 billion to the Rigas family II. Global Crossing B. Insiders sell over $1.5 billion of inflated stock III. Tyco C. CEO and CFO charged with multiple counts of fraud

Computer Science & Information Technology

Which of the following would an administrator MOST likely require in order to connect a client to a WPA encrypted network?

A. Pre-shared key B. Gateway address C. PIN D. DSA public key E. SSID

Computer Science & Information Technology

The acronym SDLC stands for

a) system development life cycle. b) system design life cycle. c) screen design for large computers. d) symbolic defined logic code.

Computer Science & Information Technology