Questions to Consider


Based on what you have read, consider the following questions and how you would reply to them:

  • Can you think of information that would be of value to you as an ISSO that would allow you to act within the OODA loops of those who want to attack your company's or government agency's systems?

  • What information on the systems must be protected so that your company's competitors or others cannot obtain it to act within the OODA loop of your company?

  • As an ISSO, do you see the extremely important role that you play in a corporation based on the "shark scenario"?

  • Do you know how secure your information and the high-technology devices that store, process, display, and transmit that information are from internal and external attacks?

  • Will the importance of information protection increase, decrease, or stay about the same as high technology and the world changes? (You may say that of course its importance will increase. However, don't be so sure.)




The Information Systems Security Officer's Guide. Establishing and Managing an Information Protection Program
The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program
ISBN: 0750698969
EAN: 2147483647
Year: 2002
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net