Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Sai Berries. 2019. Cop Tia Security Plus Certification Preparation Course.
00:08
We're going to continue our discussion off Marginal of five and the top of discussions domain five Risk management.
00:16
Interestingly enough,
00:18
this is a continuation from the previous video, where we begin the process of highlighting 5.1 with simply states explain the importance of policies, plans and procedures. Relate to organization of security
00:33
here again under objectives which encompasses this particular objective.
00:38
We go began by first taking a look at role base awareness training
00:42
and some topics which we're gonna highlight is the data owner
00:46
system administrator system owner, user,
00:49
previous users,
00:51
executive users,
00:53
Indy A or non disclosure agreement on boarding,
00:57
continuing education,
00:59
acceptable use policies and rules of behavior, and, lastly, adverse actions. So, without further, let's begin by taking a look at Roe Base awareness training
01:10
training you provide to your users should be customized to their job roles.
01:15
In this presentation, you learn about the various corporate and user rose, associate it with an application instant,
01:25
so without further, let's take a look at role base of wearing his training.
01:27
The 1st 1 holiday, it's called your data owner.
01:30
The data owner is an individual who is accountable for a data asset.
01:36
This is typically an executable that goes to the department teams
01:41
or business unit. There owns a data asset.
01:45
Then we have our system administrator. Assistant at Man is a person who is responsible for the upkeep, configuration and reliable operation computer system, especially multi user computers such as your servers.
01:59
Then we have our system owner. The infants and system owner is an organizational official responsible for the procurement,
02:07
development, integration, modification,
02:09
operation and maintenance and disposal of information system.
02:15
A user is a person or thing that uses something such as a place, facility, product or machine.
02:23
We have a privileged user, which again is a private account is a user account that has more privileged than or Mary. Users
02:35
continue on taking a look at executive user. This is a business executive is a person responsible for running
02:42
an organization, although the exact nature the role varies depending on the organization.
02:47
A non disclosure agreement India is a legal contract between two or more parties that signifies a calm potential relationship exists between them.
03:00
The term or boarding is the action or prices of integrating a new employees into an organization or familiarise a new customer or client with one's products or services.
03:13
An adverse action is a native action report to an individual or business was Julie pertains to the denial of credit, employment, insurance, other benefits,
03:27
continuing education courses that let you develop your knowledge and skills in a specific area.
03:35
Except I use policy or rules of behavior is a simple uses. Posit or fair use policy is in fact, a set of rules applied by their owner, creator order, administrator of a network website, or service. That risk rips the ways in which the network
03:51
Web study system may be used and sets guidelines as to how it should be used.
03:59
An adverse action is any inappropriate behavior that employees engaged in that violates the ownership rules and regulations and a policy procedures. Additionally, any adverse action that can potentially affect its business operation
04:14
up to include the business reputation, this action to be described in that simply use policy or a U. P or your security policy.
04:24
This brings us to a brand new objective which encompasses is 5.1, where we had to explain the importance of policies, plans and procedures relate to your organization of security. Won't take a look at general security policies. Such a social media network, an application and lastly email
04:43
turn our attention toward the discussion general security policies that general security policies are developed to address security concerns regarding all electron information within an organization.
04:55
We have our social media networks and application. A social media policy also called a social network, and policy is a corporate conduct. Other words. 1/4 conduct that provides guidelines for employees who post content on the Internet, either as part of the job
05:13
or as a private person.
05:15
You're person email basically is an effective personnel,
05:19
and open is this email policy would in fact encouraged positive, productive communication while protecting the company from legal liability, reputation, damage and security breaches.
05:32
At this point time, we have a post assessment question, which in fact, is a true off false statement,
05:39
and it reads as follows.
05:41
Separates of duties can best be described as a concept of having more than one person required to complete a task.
05:48
Is this true or false?
05:53
In this case, if you said let the true you're absolutely correct
05:58
at this point time. We have a key takeaways from this particular video presentation, and they are as follows.
06:04
We learned that a data owner is an individual who is accountable for a data asset. This is typically an executable that goes to department, team or business unit that owns a data asset.
06:17
We learned it. A system administrator or system at men is a person who is responsible for the upkeep, configuration and reliable operation of your computer systems, especially your multi user computers such as your servers.
06:31
We learned that a system owner basic, this information system owner is an organization official response for the procurement, development, integration, modification, operation, maintenance and disposal often information system.
06:48
We learned that a user is a person or thing that you this something such as a place,
06:54
facility, product or machine.
06:57
We learned that a previous user, which is basically a private account, is a user counter, has more privileges than ordinary users.
07:06
In our upcoming video, we'll be taking a look at 5.2 objective what we have to summarize Bennis impact analysis concepts, and again, I look forward to seeing, you know, very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor