Saint Leo University
COM 510: Principles of Cybersecurity Management
Chapter 4
1. Using the Internet, go to the International Information Systems Security Certification Consortium (ISC)2 Web site (www.isc2.org) and look for the InfoSec common body of knowledge (CBK). When you review the list of 10 areas in the CBK, is policy listed? Why do you think this is so?
2. Search for sample security policies on the Web. Identify five EISP and five ISSP sample policies and bring them to class. Compare these with the framework presented in this chapter and comment on the policies’ comprehensiveness.
Chapter 5
1. Assume that you are asked to recommend the professional credentials for certain roles in InfoSec at a larger organization. What is your recommendation for the credential to be held by the CISO? How about for an InfoSec Manager? What would be your recommended certifications for the senior technical staff? For the last question, pick three technical roles and note the job title and recommended credential for each.
2. Search the term “security awareness” on the Internet. Choose two or three sites that offer materials and services and describe what they offer.