IT Security and Risk Management Certifications

Journal Title: Saudi Journal of Engineering and Technology - Year 2017, Vol 2, Issue 3

Abstract

Abstract: The paper explores IT security and risk management certifications and compares them extensively to determine the best strategies for securing organization’s information systems from unauthorized modifications and potential damages. It uses credible websites, such as ISACA and the International Information Systems Security Certification Consortium (ISC2) website to gather relevant information about their certifications. Furthermore, it relies on scholarly articles published by ISACA and ISC2 to obtain relevant information regarding cybersecurity and risk governance authorizations. With this strategy, the document evaluates each certification while listing their respective security domains and prerequisites. In using both the ISACA and ISC2 accreditation realms, the paper correlates the leading certifications offered by these associations. It also assesses the data results presented by these IT security institutions to determine their value to the information system maintenance and safety. Importantly, the document explains notable security strategies and controls that are listed in both ISACA and ISC2 credentials. With these approaches, the paper provides ideal security measures and procedures that are in line with specific accreditation to ensure a comprehensive safety computer system and asset protection. Subsequently, it explains important recommendations for effective information system support and operations resulting from ISACA and ISC2 accreditations domains. Keywords: ISACA, ISC2, Certification, Information system, Cybersecurity, UnauthorizedIT Security and Risk Management Certifications.

Authors and Affiliations

Abdulhameed Jastaniyah

Keywords

Related Articles

Laboratory Study on Hydraulics of Threshold Characteristics of Underwater Erosion Resistant Material

Abstract:River bank erosion has always been a challenging problem in Bangladesh. Conventional method of designing erosion protection structures are governed by the hydraulic loads resulting from currents and waves. In pr...

Sustainable Neighborhood in Doha (State of Qatar): A Strategy for Achieving Urban Quality in Al-Hitmi

Abstract: Over the past two decades, gulf cities have been rapidly growing, mainly after the discovery of oil. Large-scale urban projects have been constructed as a result of globalization, which has affected the built e...

Wear Characterization of Advanced High Strength Steel with Cr Content under Dry Sliding Condition

Abstract:This paper describes the application of experimental design techniques to characterize the wear behavior of two medium carbon steels designing with suitable alloying elements, Mn, Si, Al, and Cr. Application of...

Study of the Viability of a Methanol-To-Gasoline Process for the Monetization of Stranded Natural Gas

Abstract: Methanol-to-Gasoline Process involves the chemical transformation of Natural gas into usable gasoline range products. The objective of this work was to conduct a techno-economic analysis of Methanol-to-Gasoline...

Optimization of Production Scheduling System (A Case of Foam Manufacturing Industry)

Abstract: In manufacturing industries production scheduling is always a key to the company’s economic growth and profitability. It defines the appropriate timing system for production. It also establish just-in-time syst...

Download PDF file
  • EP ID EP401710
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

Abdulhameed Jastaniyah (2017). IT Security and Risk Management Certifications. Saudi Journal of Engineering and Technology, 2(3), 140-146. https://europub.co.uk/articles/-A-401710