Hashtags for all economic activities & functions of government in a convenient e-book
Generic description:
Defines and makes applicable a formal organisational strategy, scope and culture to maintain safety and security of information from external and internal threats, i.e. digital forensic for corporate investigations or intrusion investigation. Provides the foundation for Information Security Management, including role identification and accountability. Uses defined standards to create objectives for information integrity, availability, and data privacy.
Competence area: e-CF area D. Enable
Proficiency levels:
e-CF level | Description | Profiles (CWA16458) |
---|---|---|
4 | Exploits depth of expertise and leverages external standards and best practices. | |
5 | Provides strategic leadership to embed information security into the culture of the organisation. | ICT security manager |
Knowledge examples (Knows /aware of/ Familiar with:)
- K1 the potential and opportunities of relevant standards and best practices
- K2 the impact of legal requirements on information security
- K3 the information strategy of the organisation
- K4 possible security threats
- K5 the mobility strategy
- K6 the different service models (SaaS, PaaS, IaaS) and operational translations (i.e. Cloud Computing)
Skill examples (Able to:)
- S1 develop and critically analyse the company strategy for information security
- S2 define, present and promote an information security policy for approval by the senior management of the organisation
- S3 apply relevant standards, best practices and legal requirements for information security
- S4 anticipate required changes to the organisations information security strategy and formulate new plans
- S5 propose effective contingency measures
The backlinks below usually do not include the child and sibling items, nor the pages in the breadcrumbs.
- Application Documentation Enablers
- Application Mediation Enablers
- Application Security Enablers
- European e-Competence Framework
- ICT security manager
- Infrastructure Data Source Enablers
- Infrastructure Financial Transaction Enablers
- Infrastructure Privacy Enablers
- Infrastructure Security Enablers
- Infrastructure Technology Governance Enablers
hashtags for goods, services and harms