CHAPTER 10
Implementing Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Introduction. . ..................................................................... 435
Information Security Project Management . . . .............................................. 436
Developing the Project Plan......................................................... 436
Project Planning Considerations...................................................... 441
Scope Considerations ............................................................. 443
The Need for Project Management ................................................... 443
Technical Aspects of Implementation . . ...................................................445
Conversion Strategies ............................................................. 445
The Bull’s-Eye Model ............................................................. 446
To Outsource or Not ............................................................. 448
Technology Governance and Change Control ............................................ 448
Nontechnical Aspects of Implementation ..................................................449
The Culture of Change Management .................................................. 449
Considerations for Organizational Change .............................................. 449
Information Systems Security Certification and Accreditation . . . .................................450
Certification versus Accreditation .................................................... 450
NIST SP 800-37, Rev. 1: Guide for Applying the Risk Management Framework
to Federal Information Systems: A Security Life Cycle Approach .............................. 451
NSTISS Instruction-1000: National Information Assurance
Certification and Accreditation Process (NIACAP) ........................................ 459
ISO 27001/27002 Systems Certification and Accreditation................................... 463
Selected Readings . . . ................................................................ 464
Chapter Summary . . ................................................................465
Review Questions. . . ................................................................ 466
Exercises .........................................................................467
Case Exercises ..................................................................... 468
Endnotes .........................................................................469
CHAPTER 11
Security and Personnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Introduction. . ..................................................................... 472
Positioning and Staffing the Security Function ..............................................473
Staffing the Information Security Function .............................................. 474
Credentials of Information Security Professionals . . .......................................... 481
(ISC)
2
Certifications .............................................................. 482
ISACA Certifications ............................................................. 485
SANS Global Information Assurance Certification (GIAC)................................... 486
Security Certified Program (SCP) ..................................................... 488
CompTIA’s Security+ ............................................................. 489
Certified Computer Examiner (CCE)
®
................................................. 490
Related Certifications ............................................................. 490
Certification Costs ............................................................... 491
Advice for Information Security Professionals ............................................ 491
Employment Policies and Practices....................................................... 494
Job Descriptions................................................................. 494
Interviews ..................................................................... 494
Background Checks .............................................................. 495
Employment Contracts ............................................................ 496
New Hire Orientation............................................................. 496
xvi Table of Contents
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.