Information custodian The information custodian, usually an information systems person, is the delegate of the Information Owner with primary responsibilities dealing with backup and recovery of the business information. Responsibilities include the following:
Application owner Manager of the business unit who is fully accountable for the performance of the business function served by the application. Responsibilities include the following:
User manager The immediate manager or supervisor of an employee. They have ultimate responsibility for all user IDs and information assets owned by company employees. In the case of nonemployee individuals such as contractors, consultants, etc. this manager is responsible for the activity and for the company assets used by these individuals. This is usually the manager responsible for hiring the outside party. Responsibilities include the following:
Security administrator Any company employee who owns a user ID which has been assigned attributes or privileges which are associated with access control systems, such as ACF2, Top Secret, or RACF. This user ID allows them to set system-wide security controls or administer user IDs and information resource access rights. These security administrators may report to either a business division or Information Security within Information Systems. Responsibilities include the following:
Security analyst Person responsible for determining the data security directions (strategies, procedures, guidelines) to ensure information is controlled and secured based on its value, risk of loss or compromise, and ease of recoverability. Duties include the following:
Change control analyst Person responsible for analyzing requested changes to the I/T infrastructure and determining the impact on applications. This function also analyzes the impact to the data bases, data-related tools, application code, etc.
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.