Professional Documents
Culture Documents
INFORMATION SECURITY
Third Edition
CHAPTER 5
DEVELOPING THE
SECURITY PROGRAM
We trained hard… but every time we formed up teams we would be reorganized. I was to learn
that we meet any new situation by reorganizing. And a wonderful method it can be for creating the
illusion of progress while producing confusion, inefficiency, and demoralization.
– Petronius Arbiter, Roman Writer and Satirist, 210 B.C.
Objectives
• Upon completion of this material you
should be able to:
– Explain the organizational approaches to
information security
– List and describe the functional components of
an information security program
– Determine how to plan and staff an
organization’s information security program
based on its size