<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://eitbokwiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jclayton</id>
		<title>EITBOK - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://eitbokwiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jclayton"/>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/Special:Contributions/Jclayton"/>
		<updated>2026-05-07T05:12:26Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.25.1</generator>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Sunzhaoshan&amp;diff=1970</id>
		<title>User talk:Sunzhaoshan</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Sunzhaoshan&amp;diff=1970"/>
				<updated>2024-04-21T05:11:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 05:11, 21 April 2024 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Elmer_Cullen&amp;diff=1969</id>
		<title>User talk:Elmer Cullen</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Elmer_Cullen&amp;diff=1969"/>
				<updated>2024-04-21T05:09:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 05:09, 21 April 2024 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Leonie_Gowing&amp;diff=1968</id>
		<title>User talk:Leonie Gowing</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Leonie_Gowing&amp;diff=1968"/>
				<updated>2024-04-21T05:09:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 05:09, 21 April 2024 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Max&amp;diff=1966</id>
		<title>User talk:Max</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Max&amp;diff=1966"/>
				<updated>2021-10-21T05:16:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 05:16, 21 October 2021 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Fredric_Dearing&amp;diff=1965</id>
		<title>User talk:Fredric Dearing</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Fredric_Dearing&amp;diff=1965"/>
				<updated>2021-06-22T05:52:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 05:52, 22 June 2021 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Anissa.Miller&amp;diff=1964</id>
		<title>User talk:Anissa.Miller</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Anissa.Miller&amp;diff=1964"/>
				<updated>2021-01-16T01:49:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 01:49, 16 January 2021 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Llopez01&amp;diff=1961</id>
		<title>User talk:Llopez01</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Llopez01&amp;diff=1961"/>
				<updated>2020-06-28T18:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:47, 28 June 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Peacebaba&amp;diff=1960</id>
		<title>User talk:Peacebaba</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Peacebaba&amp;diff=1960"/>
				<updated>2020-05-06T04:39:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 04:39, 6 May 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Simha_n&amp;diff=1959</id>
		<title>User talk:Simha n</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Simha_n&amp;diff=1959"/>
				<updated>2020-04-30T19:03:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 19:03, 30 April 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Ewunipyv&amp;diff=1958</id>
		<title>User talk:Ewunipyv</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Ewunipyv&amp;diff=1958"/>
				<updated>2020-04-30T19:02:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 19:02, 30 April 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Beango&amp;diff=1955</id>
		<title>User talk:Beango</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Beango&amp;diff=1955"/>
				<updated>2020-02-28T20:43:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:43, 28 February 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Elyesgrar&amp;diff=1954</id>
		<title>User talk:Elyesgrar</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Elyesgrar&amp;diff=1954"/>
				<updated>2020-01-22T18:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:20, 22 January 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Dwelwell&amp;diff=1953</id>
		<title>User talk:Dwelwell</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Dwelwell&amp;diff=1953"/>
				<updated>2020-01-22T18:19:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:19, 22 January 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Svirk&amp;diff=1952</id>
		<title>User talk:Svirk</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Svirk&amp;diff=1952"/>
				<updated>2019-10-28T16:32:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 16:32, 28 October 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Jyotirmoyr&amp;diff=1951</id>
		<title>User talk:Jyotirmoyr</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Jyotirmoyr&amp;diff=1951"/>
				<updated>2019-10-21T01:32:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 01:32, 21 October 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Odhiambo&amp;diff=1950</id>
		<title>User talk:Odhiambo</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Odhiambo&amp;diff=1950"/>
				<updated>2019-10-21T01:32:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 01:32, 21 October 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Nigina&amp;diff=1949</id>
		<title>User talk:Nigina</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Nigina&amp;diff=1949"/>
				<updated>2019-10-03T00:08:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 00:08, 3 October 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Nkambumw&amp;diff=1948</id>
		<title>User talk:Nkambumw</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Nkambumw&amp;diff=1948"/>
				<updated>2019-10-03T00:08:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 00:08, 3 October 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Giovanni&amp;diff=1947</id>
		<title>User talk:Giovanni</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Giovanni&amp;diff=1947"/>
				<updated>2019-07-04T06:21:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 06:21, 4 July 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Trygstad&amp;diff=1946</id>
		<title>User talk:Trygstad</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Trygstad&amp;diff=1946"/>
				<updated>2019-07-04T06:21:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 06:21, 4 July 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Naimishsinha&amp;diff=1945</id>
		<title>User talk:Naimishsinha</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Naimishsinha&amp;diff=1945"/>
				<updated>2019-07-04T06:19:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 06:19, 4 July 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Richh&amp;diff=1944</id>
		<title>User talk:Richh</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Richh&amp;diff=1944"/>
				<updated>2019-07-04T06:19:02Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 06:19, 4 July 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Tuliowm&amp;diff=1942</id>
		<title>User talk:Tuliowm</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Tuliowm&amp;diff=1942"/>
				<updated>2019-01-22T22:55:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 22:55, 22 January 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:DWElwell&amp;diff=1941</id>
		<title>User talk:DWElwell</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:DWElwell&amp;diff=1941"/>
				<updated>2018-11-08T01:26:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 01:26, 8 November 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Constantin.urseiu&amp;diff=1939</id>
		<title>User talk:Constantin.urseiu</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Constantin.urseiu&amp;diff=1939"/>
				<updated>2018-08-20T18:29:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:29, 20 August 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Adrian.labuschagne&amp;diff=1938</id>
		<title>User talk:Adrian.labuschagne</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Adrian.labuschagne&amp;diff=1938"/>
				<updated>2018-08-20T18:27:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:27, 20 August 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Jorgemurillo&amp;diff=1937</id>
		<title>User talk:Jorgemurillo</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Jorgemurillo&amp;diff=1937"/>
				<updated>2018-08-03T20:06:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:06, 3 August 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Dartango&amp;diff=1936</id>
		<title>User talk:Dartango</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Dartango&amp;diff=1936"/>
				<updated>2018-08-03T20:04:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:04, 3 August 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:JScheidell&amp;diff=1935</id>
		<title>User talk:JScheidell</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:JScheidell&amp;diff=1935"/>
				<updated>2018-06-05T18:44:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:44, 5 June 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:IGeoffy&amp;diff=1934</id>
		<title>User talk:IGeoffy</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:IGeoffy&amp;diff=1934"/>
				<updated>2018-06-05T18:43:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:43, 5 June 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Raja_ks&amp;diff=1933</id>
		<title>User talk:Raja ks</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Raja_ks&amp;diff=1933"/>
				<updated>2018-06-05T18:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:41, 5 June 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Maica0828&amp;diff=1932</id>
		<title>User talk:Maica0828</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Maica0828&amp;diff=1932"/>
				<updated>2018-04-18T18:45:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 18:45, 18 April 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Security&amp;diff=1871</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Security&amp;diff=1871"/>
				<updated>2017-12-19T23:26:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki. Like all wikis, it is a work in progress and may contain errors. We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Introduction&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;There are only two types of companies: those that have been hacked, and those that will be.&amp;quot; &amp;lt;br /&amp;gt;~ FBI Director Robert Mueller, October 2012&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know that they've been hacked by the Chinese.&amp;quot; &amp;lt;br /&amp;gt;~ FBI Director James Comey, October 2014&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Whether you call it computer security, cybersecurity, or EIT security, one thing is true, technological security is a rapidly changing area. The change is so rapid that it is nearly impossible for organizations (whether commercial, educational, or governmental) to keep up with the perpetrators of cyberattacks. Attacks that used to be carried out by lone individuals trying to see if they could get access to &amp;quot;secure&amp;quot; servers are now being organized and financed by governments. The way that an organization approached security in 2005 isn't sufficient in 2017, and we are pretty sure that it will be a totally different world in 2025. Flexibility and adaptability in this area is essential. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Organizations (both small and large) depend on information technology and the information systems that are developed to successfully carry out their missions and business functions. Information systems can include a vast range of diverse computing platforms from high-end supercomputers and highly virtualized platforms to tablets and mobile devices. Information systems also include specialized systems and devices, such as telecommunication systems, industrial/process control systems, testing and calibration devices, weapons systems, command and control systems, and environmental control systems. '''All of these systems are subject to serious threats''' that can have adverse impacts on organizational operations, assets, individuals, associated organizations, and even countries by compromising the confidentiality, integrity, or availability of information being processed, stored, or transmitted by those systems.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Threats to information and information systems include environmental disruptions, human and machine errors, and purposeful attacks. Cyberattacks on information systems today are often aggressive, disciplined, well-organized, long-term, well-funded, and in a growing number of documented cases, extremely sophisticated. Successful attacks on public and private sector information systems (especially toward critical infrastructure) can result in serious damage not only to the organization that was attacked, but also to the national and economic security interests of an entire country.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;We make an attempt in this chapter to describe EIT security as we know it today. We highlight the current challenges and indicate some of the most successful processes that enterprises use in this ongoing battle.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Goals and Principles&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While there are many definitions for security, most include the three dimensions of [http://eitbokwiki.org/Glossary#ciatriad confidentiality, integrity, and availability] (sometimes referred to as the ''CIA triad''). As such, the primary goal of EIT security is to preserve the ''confidentiality, integrity, and availability of information and information systems''.&amp;amp;nbsp;[[#One|[1]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The principles behind an organization's [http://eitbokwiki.org/Glossary#isms information security management system (ISMS)] &amp;amp;nbsp;[[#Two|[2]]] should be to design, implement, and maintain a coherent set of policies, processes, and systems that keep the risks associated with its information assets at a tolerable level, and yet, manage the cost and inconvenience of said risk management. As such, the goals of EIT security are to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Always understand the current risk tolerance of the enterprise with respect to information and device security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understand the security threats and potential damages to information, devices, and individuals.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Create and follow policies and procedures that keep cyberattack risk and damages at or below a tolerable level.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Effectively and efficiently detect and deal with cyberattack incidents.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Context Diagram&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:05 Security CD.png|700px]]&amp;lt;br /&amp;gt;'''Figure 1. Context Diagram for Security'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Information Security Management&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;An information security management system (ISMS) includes policies, processes, procedures, organizational structures, software, and hardware to protect the identified information assets. These controls need to be specified, implemented, monitored, reviewed, and improved where necessary, to ensure that the specific information security and business objectives of the organization are met. Relevant information security controls are expected to be seamlessly integrated with an organization's business processes.&amp;quot; ~ ISO/IEC 27002:2013, Clause 3.2.3 Information security, Pg. 26&amp;amp;nbsp;[[#Three|[3]]]&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An ISMS must remain in place and be effective for a long period of time; however, it must also be able to adapt to changes in the EIT organization and the solutions that it supports, as well as evolving security threats. As a result, the ISMS must be carefully designed, implemented with care, strongly managed, and continuously reevaluated and updated.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Management Practices and Frameworks&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A mature ISMS uses an information security framework to achieve the enterprise's objectives. Such a framework is a series of documented processes that are used to define policies and procedures that support the implementation and ongoing management of information security controls. A framework is basically a blueprint for building an information security program to manage risk and reduce vulnerabilities, and to define and prioritize the tasks required to build security into an organization.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are several mature information security frameworks, including the following more widely used frameworks:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''ISO/IEC 27000 Series'''—The International Organization for Standardization (IOS) and the International Electrotechnical Commission (IEC) provide recommended practices on information security management and program elements. ISO defines the broadest structure of an effective overall program, supporting information security as a systems issue that includes technology, practice, and people. It also describes the need for a formal security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''NIST SP 800 Series'''—The National Institute of Standards and Technology (U.S. Department of Commerce) has produced a number of special publications (the 800 series) that are specifically focused on computer security. This series discusses the Information Technology Laboratory's research, guidelines, and outreach efforts concerning computer security, along with its collaborative activities with industry, government, and educational institutions. Some examples of these collaborations include catalogs of security controls for information systems (800-53).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''COBIT'''—The Control Objectives for Information and Related Technology (COBIT) is a set of mythologies and practices for EIT management that focuses on defining program and management control functions. Use of these standard practices can help ensure that EIT programs are implemented and managed effectively. COBIT states that the security publication &amp;quot;provides guidance to help EIT and security professionals understand, utilize, implement, and direct important information-security-related activities, and make more informed decisions while maintaining awareness about emerging technologies and the accompanying threats.&amp;quot;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Information Security Forum's Standard of Good Practice'''—This document is a comprehensive, business-focused guide to managing information security risks. It is aligned with the requirements for an ISMS as described in the ISO/IEC 2700X standards. It provides deeper coverage for most of the control topics.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''ISACA RISK IT'''—The Information Systems Audit and Control Association (ISACA) has produced a Risk IT framework that aims to fill the gap between generic risk management frameworks and more specific EIT risk management frameworks. It provides a wide view of all risks related to EIT and a similarly thorough treatment of risk management. It builds upon the other risk-related components within the current ISACA frameworks, such as COBIT and Val IT.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''OCTAVE'''—The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) method is used to assess an organization's information security needs. OCTAVE methods are self-directed and flexible. Small teams across business units and EIT can work together to address the security needs of the enterprise. OCTAVE can be customized to match the organization's unique risk environment, security and resilience objectives, and skill level. OCTAVE moves an organization toward an operational risk-based view of security and puts it in a business context.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''COSO'''—The Committee of Sponsoring Organizations (COSO) of the Treadway Commission has created a list of control objectives for enterprise governance and risk management. COSO defines a set of business, management, and security-relevant controls that can be used to demonstrate good business practices, and can be used to show compliance with Sarbanes-Oxley.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''HITRUST CSF'''—This is a certifiable framework that provides healthcare-relevant security regulations and standards. It describes a flexible approach to risk management and compliance for the HIPAA and HITECH regulations (described later). At the present time, it is the most widely adopted security framework by the US healthcare industry.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;The Cybersecurity Laws and Regulations Factor&amp;lt;/h3&amp;gt; &lt;br /&gt;
&amp;lt;p&amp;gt;An ISMS cannot be constructed without considering the laws and regulations that affect the enterprise. The issue here is that those laws and regulations are under constant flux. When investigating cybersecurity laws and regulations, we have to look at local, state, national, and international regulations. We also have to consider regulations specific to the enterprise's industry, such as health care. For larger organizations that have significant risk, security lawyers may be required to identify relevant regulations and to keep track of new legislation. Here is a brief overview.&amp;amp;nbsp;[[#Sixteen|[16]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each country has its own laws, and those laws differ a great deal. Over the last several years, the UN has taken up the issue of cybersecurity. In 2013, the United Nations Group of Governmental Experts (GGE) published a report that listed a set of &amp;quot;high-level cyber norms&amp;quot; that all countries should follow. They include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Abide by international law when operating in cyberspace.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Honor the &amp;quot;norm of state responsibility&amp;quot; for cyberattacks emanating from their territory.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Work to develop confidence-building measures to reduce risk of conflict.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Engage in capacity-building efforts to assist developing countries build skills to protect their networks and citizens.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The GGE meets fairly regularly to build on their work and have recently taken on defining limits on the use of national cyberpower aimed at the critical infrastructure of other states.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Laws and Regulations Outside the United States&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As mentioned above, cybersecurity is a fast-changing area globally. Although the US, China, and Russia have been considered in the lead, most countries have basic cybersecurity laws and policies. Many of those are associated with the country's national security and defense strategies. It would take too long to go through every country, so we have picked a few to discuss. For information about specific countries and their policies and security strategies, visit https://ccdcoe.org/cyber-security-strategy-documents.html.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''China'''—China has a set of the world's tightest Internet restrictions and this is part of their cybersecurity strategy. They have numerous laws that authorize the control of flow of online information in the country and many foreign sites are blocked. Laws also require companies to censor and restrict online anonymity, to store user data in China, and to monitor and report all network security incidents. China is serious about security and jails more people for computer &amp;quot;misuse&amp;quot; than any other country; however, most of the people are arrested as part of their censorship laws, not cybercrimes. Blogs and social-site posts critical of the government usually result in an arrest. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Russia'''—Like China, for many years Russia was worried about cybercontent (the information) more than cybersecurity. However, they have not overtly censored social media or blogs, like the Chinese. In addition, they have maintained a strict &amp;quot;non-interference&amp;quot; policy concerning their cyberspace, which has pushed them to create numerous international non-interference pacts. Russia has well-developed tools for incident detection and is also considered a leader in developing software and techniques for cybercrime. Interestingly enough, it has only been since 2012 or so that Russia started to take cybercrimes committed by Russians seriously.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The European Union'''—In 2013, the European Commission and High Representative's ''Cyber Security Strategy'' document was the first comprehensive EU document concerning cyberspace. It set the tone of the EU's strategy as &amp;quot;open, safe, and secure,&amp;quot; and it specified how the EU would approach building their cybersecurity capacity. In August 2015, the EU proposed a strict law to impose security requirements on Internet service providers and web companies. The new law also requires reporting data breaches to EU governments. One of the critical points brought up in the deliberations of the law is that if a cloud computing company or ISP does business with a &amp;quot;critical sector&amp;quot; company, the web company needs to follow the same security rules as the critical sector company.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Laws and Regulations in the United States&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;National Laws and Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Over the last 15 year, the US federal government has lead the way in developing laws and regulations regarding cyberhacking and cybersecurity. The laws treat different organization types differently, so some enterprises are strongly affected by cybersecurity laws and regulations while other are not affected at all. Despite the fact that most people believe that cybersecurity regulations are necessary, there is a lot of disagreement about who these laws should regulate. Some people believe that laws should cover only acts of breaching security (hacking). Others think that there should be laws to regulate businesses and how they protect data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In the US, cybersecurity regulation consists of directives (both administrative directives and legislation) that safeguard information technology and computer systems. The purpose of these directives is to force companies and organizations to protect their systems and information from cyberattacks, such as viruses, worms, Trojan horses, phishing, [http://eitbokwiki.org/Glossary#dos denial-of-service (DOS)] attacks, unauthorized access (stealing intellectual property or confidential information), and control system attacks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most regulations encourage the use of measures that are designed to prevent cyberattacks, including firewalls, antivirus software, intrusion detection and prevention systems, encryption, and login passwords.&amp;amp;nbsp;[[#Two|[2]]] For most industries, these measures are currently voluntary. There are three regulations that mandate healthcare organizations, financial institutions, and federal agencies protect their systems and information: the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although the mandates only cover a few industries right now, many industry regulators are planning to include cybersecurity measures as a part of their standard regulatory examinations in the near future.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;State and Local Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;State governments have attempted to improve cybersecurity by increasing public visibility of firms with weak security. In 2003, California passed the Notice of Security Breach Act and California Assembly Bill 1958, which requires that any company maintaining personal information (name, social security number, driver's license number, credit card number, or financial information) of California citizens that has a security breach must disclose the details of the event. In 2004, California passed California Assembly Bill 1950, which also applies to businesses that own or maintain personal information for California residents. This regulation dictates that businesses maintain a reasonable level of security and that these required security practices also extend to business partners. These security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. Many other states have passed similar laws. The problem with many of these laws is that they use the phrase &amp;quot;reasonable level of security.&amp;quot; This phrase gives businesses too much room for interpretation. In addition, it is unclear whether organizations can actually be held accountable in court.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;Privacy Laws and Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As mentioned above, the number of laws and regulations concerning data security are increasing over time. Privacy of customer transactions, whether a purchase or some other action, is considered the ethical responsibility of EIT by most governing bodies these days. This is a huge area of vulnerability for many enterprises, and many cybersecurity experts believe that litigation associated with privacy and data protection breaches are going to increase significantly in the near future.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The International Association of Privacy Professionals (IAPP) glossary&amp;amp;nbsp;[[#Five|[5]]] defines privacy as: ''The appropriate use of personal information under the circumstances. What is appropriate will depend on context, law, and the individual's expectations; also, the right of an individual to control the collection, use and disclosure of information.'' Data protection is defined as the management of personal information.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In the United States, ''privacy'' is the term that is used in policies, laws, and regulation. However, in the European Union and other countries, the term ''data protection'' often identifies privacy-related laws and regulations. Because of the different levels of regulation, international agreements have come into existence to manage compliance between countries and regions. The best known example being the US-EU Safe Harbor Principles, which streamline compliance for US companies attempting to meet the EU directive (95/46/EC) on protection of personal data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The regulations associated with privacy are changing frequently, but the most common US laws are listed below.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Healthcare providers, payers, clearinghouses, and similar organizations must comply with a set of government regulations such as the '''Health Insurance Portability and Accountability Act (HIPAA)''' and the '''Health Information Technology for Economic and Clinical Health Act (HITECH)'''. Over the years, enforcement for violations of both of these acts has been strengthened, and incentives have been put in place for the adoption of a secure electronic health records act to protect personal health information.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The '''Gramm-Leach-Bliley Act''' requires financial institutions that offer consumers financial products or services to safeguard sensitive client data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The '''Payment Card Industry Data Security Standard (PCI-DSS)''' is a common set of security controls for protecting credit card information maintained by the PCI Security Standards Council. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Consent management''' is the newest level of privacy legislation coming into effect, which has steep fines for non-compliance distribution of content.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Data and privacy protection is important to most other countries and regulations have been uniformly increased around the world in the last few years:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The EU Data Protection Directive has been in place since 2011, and will be updated by the end of 2015 to Directive 95/46/EC. It will likely be one of the strongest sets of regulations to protect personal data in the world. Its primary goal is to bring all EU nations into alignment with respect to data protection and to raise every member country's standards, but it will also lay the groundwork for fining companies that do not comply with the new regulations. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;In 2014, Australia amended its Privacy Act to cover cloud and communications service providers and any other organizations that collect, process, or store personal information. As with many of the policies of other countries, not only does this amendment increase coverage of the law to global service providers, it enables the Australian Information Commissioner to monitor how companies comply with the policy, train their staff, and handle incidents and complaints.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;More about Privacy and Data Protection&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;ISO/IEC 29100&amp;amp;nbsp;[[#Six|[6]]] identifies a number of what they call privacy principles that should be followed by all organizations that handle personal information:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The owner of the data must have consent and choice.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The user of the data must specify their use and demonstrate legitimacy of purpose.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The collection of data must be limited to the specified purpose.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The data kept should be minimized to just what is needed.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The data use and retention should be limited and disclosed.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization should be able to ensure the accuracy and quality of the data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization should demonstrate openness, transparency, and notice.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization must be accountable.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization needs to provide a reasonable amount of information security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization must be compliant with all privacy laws and regulations.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Establishing Enterprise-Wide Security&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Establishing an effective enterprise-wide security program is a critical and difficult task. It requires both careful assessment of the enterprise's current situation, and an understanding of the organization's tolerance for risk. When those things are understood, a plan needs to be developed that covers all departments of the enterprise, as well as staff, vendors, and clients.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Enterprise-Level Vulnerability Assessment and Risk Tolerance&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;Risk management is the process for identifying, analyzing, and communicating risk and accepting, avoiding, transferring, or controlling it to an acceptable level considering associated costs and benefits of any actions taken.&amp;quot;'' ~ DHS Risk Lexicon, 2010 Edition&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of vulnerability assessment and risk management is a key security competency for all enterprises. Risk management is more than just looking for vulnerabilities and then planning how to protect against them. There are two factors to consider. First, an organization could just shut down access to systems to control threats, but that likely does not meet the business's objectives and purpose for existence. For example, an online store has to provide access to its customers, and therefore has significant vulnerabilities by definition. Second, no institution can afford to be completely secure—if that is even possible. So, the risk management area is a balancing act; one that requires careful technical and cost/benefit analysis. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As such, listing an organization's vulnerabilities isn't good enough. Instead, it is critical to understand three other factors:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The potential cost in damages of each identified risk/threat (monetary, disruption of business, and loss of trust by customers, vendors, and other associates)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The probability of the each identified risk to occur (which changes over time)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The means and costs of protection (or mitigation) from the threat&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When you have thoroughly analyzed each threat, you can prioritize the organization's efforts in protecting against or mitigating the threats.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Maybe just as important as performing a risk analysis is understanding the organization's risk appetite (or risk aversion). The organization needs to understand how much risk it is willing to take, along with what types of damage are tolerable and intolerable. And, it is also critical to understand how much the organization can afford to protect against the threats. The organization's lawyers need to be engaged to identify and evaluate potential litigation risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Internal risk comes from three sources: the technology, the organization's standard procedures, and the staff. All of these change constantly, so security planning and policy development is a non-stop process. The technology (software and hardware) is in a constant state of flux. Although often overlooked, the lack of carefully designed policies and operating procedures open up the enterprise to a number of threats and losses. Finally, an organization's own employees, consultants, and vendors are sources of exposure to breaches of security. According to analysts, insiders are responsible for more security violations and breaches than all the other sources of harm combined.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Developing a Security Plan and Program&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An effective security program requires a comprehensive security plan. The security plan should cover all security functions, areas, processes, policies, and procedures. It needs to be specific, clear, and well organized. The activities associated with developing a security plan and program are discussed below.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:SecurityPlanDevelopment.jpg|700px]]&amp;lt;br /&amp;gt;'''Figure 2. Security Plan Development'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Define specific security goals'''—The goal of this activity is to define or frame measurable EIT security goals. These goals must be in complete alignment with the enterprise's security objectives and with the risk tolerance of the organization. They also need to be specific, detailed, and measurable. Security goals should typically cover the following areas:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identifying, prioritizing, and addressing security gaps&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Tool purchase and development&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Law and regulation compliance&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat detection and response&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ongoing training and certification for security personnel&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ongoing training of non-security personnel&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous communication of program goals and potentials for exposures&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Categorize and assess information assets'''—This activity involves creating a comprehensive catalog of the organization's information assets. Each asset must be evaluated with respect to the value of its information to the organization and the cost of potential damage, whether that damage is due to a leak of information, actual damage to the systems or information, or a lack of availability for a short or extended period of time. In addition, the report should list the acceptable level of exposure to risk for the asset (loss, damage, unauthorized access) and the acceptable constraints that can be placed on the asset by the technology and policies designed to keep it secure.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Design alternative risk controls'''—There are a number of alternatives available for protecting information assets. Each alternative has its strengths and weakness with respect to the enterprise's strategic and security goals. Each alternative also has its associated implementation and maintenance costs. By setting priorities and managing costs, the team can build an effective security architecture that contains routine electronic and process-based actions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Implement and communicate selected controls'''—Implementing the controls is often more than just installing security software and establishing security-related policies and procedures. Often general controls must be customized for the specific threat and information asset that they are meant to address. In addition, the controls need to be an integral part of the processes or assets that they support. Simply adding them on and expecting them to be used or followed is wishful thinking.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Test controls'''—The organization needs to create an assessment method to evaluate the effectiveness of the implemented controls. These come in the form of prearranged tests and reviews that ensure that the controls are protecting the assets as designed. The testing process should also assess whether policies and procedures are being followed by employees. If an organization doesn't test its controls, it can't certify to any governing body that its controls are effective. In some industries, being able to demonstrate that you are in compliance is critical. For other industries, it's just good business.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Detect and address security incidents'''—Finally, an organization needs to detect when security breaches occur and deal with those breaches in an effective and efficient manner. We discuss this subject at length in the [[#SecurityIncident|Security Incident Response and Management]] section.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;The Ongoing Security Planning Cycle&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;The risk management process is a continuous process for systematically addressing risk throughout the lifecycle of a system, product, or service.&amp;quot;'' &amp;lt;br /&amp;gt;~ ISO/IEC 16085:2006 Systems and software engineering—Lifecycle processes—Risk management, 3.12&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Because security is now an aspect in the lifecycle of all systems and services provided by an organization, the planning cycle is never over. Each time an organization fields a new capability, security must be considered. Even when maintaining an old system, security planning is involved. In addition, new threats and vulnerabilities are regularly identified, which requires an organization to constantly update their security capabilities. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The result is that organizations need to continuously take inventory, analyze, design, implement, and test their security system—and update the security plan accordingly. This ongoing process makes it essential to implement some kind of continuous improvement program that allows the organization to adapt to change quickly. This activity needs to be part of the overall security program.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Here are some of the most often used processes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''[http://eitbokwiki.org/Glossary#pdca Deming Cycle (plan, do, check, act)]'''—The PDCA process was incorporated into ISO/IEC 27001:2005 as the preferred risk management processes. This cycle contains four steps:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Plan'' phase—Design the ISMS by assessing information security risks and then selecting the appropriate controls for the risks.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Do'' phase—Implement and use the security controls.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Check'' phase—Review and evaluate the effectiveness and efficiency of the ISMS.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Act'' phase—Modify the ISMS as necessary to improve effectiveness or efficiency. &amp;lt;/li&amp;gt;&amp;lt;/ol&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''[http://eitbokwiki.org/Glossary#dmaic Six Sigmas DMAIC (define, measure, analyze, improve, control)]'''—This process refines the Deming Cycle and is a data-driven quality strategy for improving a process that is often customized for use by security departments.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Information Security Forum's SOGP (Standard of Good Practice)'''—This document is a comprehensive, business-focused guide to managing information security risks. One of its sections discusses good practices with respect to security risk management. It also discusses the details of policies, standards, and procedures.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Security Education and Training&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An essential part of any ISMS is the organization's security training program. These training programs often come in several different levels that match the sophistication and job function of employees. Security training is not just for those individuals actively involved in designing, implementing, and monitoring the security program—it is for all employees. A large number of security breaches are linked to employees' actions. Security threats cannot be totally addressed through security software and hardware—the human factor has to be addressed. Employees need to modify their standard operating behavior to reduce overall exposure to attacks—new security policies and procedures must be followed. As a result, security training programs need to be comprehensive and applied throughout the workforce. A good source of free online video training is at https://www.csiac.org/series/information-awareness-videos/. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Security training programs need to instruct even low-level workers about their security responsibilities and teach them about information security processes and procedures that are appropriate for their job function. These programs are often referred to as ''security awareness programs''. Among other topics, security awareness programs cover how to avoid threats and attacks associated with:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Email and IM&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Browsers&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Inadequate passwords&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Mobile devices &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Lack of encryption&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Not only do employees need to be taught about the vulnerabilities associated with different tasks, such as reading email, but they also need to be given the tools to minimize the threats. A program should exist to keep the training and the tools up to date as part of the ongoing organizational processes. In addition, non-technical employees need to be motivated to follow the enterprise's security procedures; otherwise, they will not do so.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Training for more technical individuals needs to address the technical aspects of preventing security breaches. For example, security training for the programming staff should include information about how to conduct a code review to identify vulnerabilities in the code.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The training for the security team needs to be the most comprehensive, and it also needs to be continuous. As attacks become more sophisticated, the training level of the security staff needs to keep up. The constant change in every area of security is what drives specialization. The advanced training classes often focus on only one area, such as data security or defense against denial of service attacks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The training function needs to be accountable and reviews need to be conducted regularly. Measure the effectiveness of the training from both a programmatic and individual perspective. When the effectiveness is found to be lacking, updates need to be made immediately.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Assets, Risks, and Threat Protection&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When goals are defined, it is time to take inventory. There are large numbers of EIT assets that need to be categorized and evaluated for potential risk. Often the EIT security arena is divided into facilities, computer hardware, telecommunications, networking, software, and information (data), better enabling the organization to identify each asset and evaluate the potential of the asset as a security risk. Individuals with security risk identification skills specific to each area need to be involved in the activity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When each asset is identified, the team needs to enumerate the risks associated with the asset. Some assets may only have a couple of risks or potential threats associated with them, while others may have hundreds of potential risks. For each risk, the team needs to evaluate the cost of a security breach for that asset in concert with the asset owner and stakeholders.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Facility Security Evaluation&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Facility security is part of most companies' plans and this has been the case for years. These plans are usually ''perimeter based''. Using this mindset, the organization can consider everything in a defined area as one large asset. You might think that a standard facilities security plan would be good enough, but an alarming number of cyberattacks occur inside the defined security perimeter of a standard physical security plan. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To counter these attacks, facility security plans need to be changed from being perimeter based to being ''area based''. All assets within an area, even the non-tangible information assets, need to be protected. Therefore, the physical security planning process needs to be fully integrated with those steps that protect the information assets themselves. The facility security plan needs to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Clearly identify and define protected areas; define a layered defense.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Regulate access to protected spaces 24 x 7.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect against physical intrusion into any protected space.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect sensitive equipment as well as equipment that contains sensitive information, including portable devices.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect sensitive materials on desks, walls, and so on, ensuring that they are always located in a safe place.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Clearly define appropriate responses to any identified security breaches.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Asset identification processes and the security plan need to take into account not only threats associated with unauthorized entry of an individual, but also damage caused by man-made or natural disasters. All of these threats need to be identified and safeguards/techniques need to be identified to protect against them (see the [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness] chapter). &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Telecommunications &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Telecommunications networks and other pieces of infrastructure are rapidly being assimilated into the Internet. Today, systems such as electrical grids and traffic systems are now accessible to users, regardless of their location, with a few clicks of a mouse. These tremendous capabilities are not without consequences. For example, a hacker can launch attacks capable of denying voice service to cellular telecommunications networks in major cities, or use telecommunications for turning off utilities in the smart grid. In times of emergency, when such networks are essential in saving lives, such attacks can be extremely dangerous.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When evaluating assets, and looking for risks and mitigation techniques, the telecommunications team needs to consider the following security techniques:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Authorization'''—Requiring authorization to help prevent unauthorized interceptors from accessing telecommunications in an intelligible form while still delivering content to the intended recipient&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Cryptosecurity'''—Communications security that results from the use of cryptosystems to ensure message confidentiality and authenticity&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Emission security'''—The protection to deny unauthorized personnel information due to interception and analysis of emanations from cryptographic equipment, information systems, and telecommunication systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Transmission security'''—The security that protects transmission from interception and exploitation by means other than cryptanalysis, such as frequency hopping and spread spectrum&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Physical security'''—All physical measures necessary to safeguard classified equipment, material, and documents from access&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Network and Internet Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although similar to telecommunications security, network and Internet security present additional assets and risks. The open nature of the Internet puts all users at risk of attack. It also puts all servers, computers, and other devices that interact with the Internet at risk. As a result, carefully documenting all network settings, proxies, licenses, VPNs, and the assets on each LAN or network segment is critical. Each must be examined for vulnerability.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Understanding where all the assets are and how open they are to network traffic is difficult, but necessary to assess the true threat risk for the asset. The team needs to be able to understand the potential risks of denial of service or phishing from any given device on not only that device, but the rest of the assets on that part of the network.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In addition, it is important to understand the needs of users for network and Internet use. If users don't need to have access to the Internet, many issues become irrelevant. Some enterprises set up separate network access routes for employees to use so that access from a secure intranet is impossible.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Computers and Mobile Devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each computational device needs to be evaluated. Although we most often think of threats associated with software, hackers can attack the devices themselves either via theft, electronic intrusion, and physical damage. The security plan needs to protect hardware and other devices from all these kinds of threats. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To understand what threats apply, collect detailed information about each piece of hardware, such as: &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operating system version&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Internet browser version &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Asset usage and users of the asset &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Applications running on the asset&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Peripherals used &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This information helps determine what threats need to be considered.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Mobile Device Security&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Mobile devices have become so powerful and well integrated into business operations that they must be treated like any other information system. The data on them often is as sensitive as that on data servers and workstations. In addition, the mobility of the devices allows the device to access the Internet nearly anywhere, and also makes them both easy and desirable to steal. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The EIT security staff needs to understand what devices are being used, where they are going, and what applications and data they contain. Staff also need to have controls in place so that unauthorized mobile devices cannot access data stores. Understanding the risks allows the security team to determine what type of security software needs to be installed, and what measures need to be taken to protect sensitive information. Because of the ubiquitous nature of mobile devices, various [http://eitbokwiki.org/Glossary#mdm mobile device management (MDM)] suites have been created to centralize controls. MDM can provide risk mitigation (such as the remote wipe of a mobile device) or policy enforcement (such as device encryption) without requiring security staff to individually configure each device.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Application and App Development Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Application security includes those measures taken within the code to prevent security gaps whether due to flaws in the design, implementation, deployment, or maintenance processes associated with the application.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with all the other areas, it is important to take inventory of your software assets so that you know the potential threats due to the functionality of the systems. As organizations field software, the security of the software asset is not complete without consideration of the software itself, the host, connected devices, and the network.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Through the years, many techniques and development lifecycles (e.g., Microsoft SDL, OWAP CLASP, Cigital touchpoints) have been developed (see ''Improving Web Application Security''&amp;amp;nbsp;[[#Four|[4]]]) that include patterns and techniques to help identify the types of attacks to which an application is vulnerable. There are many categories of attacks on apps that have been identified, including:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Software tampering (changing, substituting, or extending code)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication attacks (credential theft, brute force attack, cookie replay)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authorization attacks (data tampering, elevation of privileges)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptographic attack (encryption breaking due to poor key management or weak encryption)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Session takeovers (session hijacking, session replay)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitive information attacks (eavesdropping, data tampering, accessing sensitive data)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Lists of vulnerabilities can be found in a number of sources, including OWASP Tops 10&amp;amp;nbsp;[[#Eleven|[11]]], SANS Tops 25&amp;amp;nbsp;[[#Twelve|[12]]], and CVE&amp;amp;nbsp;[[#Thirteen|[13]]].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Mobile applications are even harder to protect than workstation-based applications. Weakness in mobile application security can come from many sources, but the largest endemic risk is from the mobile platform itself. A vulnerability in the mobile platform can impact the confidentiality, integrity, and availability of all applications on a device or a fleet of devices. In addition, mobile application stores provide a supply-chain risk. A user could potentially download an application for which the user does not have the correct level of access, putting their device at risk. &amp;amp;nbsp;[[#Nine|[9]]]&amp;amp;nbsp;[[#Ten|[10]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are several strategies that programmers can use that can enhance mobile app security, such as using stronger authentication and authorization, tying processes to user IDs, and ensuring transport-layer security. There are many sources available that discuss how to build security into applications.&amp;amp;nbsp;[[#Eight|[8]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Data Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although related to all the other levels of assets, a security plan needs to consider some individual data items as assets themselves. It doesn't matter how the hacker gets into the database (hardware, software, network, or physical access), the fact that sensitive information, such as social security, telephone, and credit card numbers are accessed is extremely damaging to the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The data security team needs to understand which elements in the database are particularly sensitive or critical for operations. There are a whole host of means by which data systems can be compromised and each of these potential threats needs to be analyzed and mitigated.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Theft of storage element or media&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Loss of a storage element or media&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Loss of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Tampering of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Unauthorized privileged access of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Media configuration changes (intentional, malicious, or not)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Denial of service/access&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Traffic/communications monitoring&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Designing Controls&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are a host of known designs, techniques, tools, and consultants that can help design security controls. Many books are written about the topic. And, yet, this is a very difficult process. There needs to be balance between providing the best security against potential threats, while still providing the functionality required by the business requirements of the enterprise. Some risks can be tolerated if they are required to run the business; for example, the risks associated with running an online store. The cost of implementing a mitigation technique also needs to be carefully evaluated, because the cost of the solution could be higher than the potential cost of the risk. Often, a security policy or manual procedure is the most cost-effective solution available.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Knowing different security models and techniques can guide the security team in designing and selecting the best mitigation technique to use. We cover some of those design models and considerations here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Policy and Procedure Development &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Effective security policies that are followed throughout the enterprise are another essential component of the security program. These policies need to be carefully designed, well-communicated and monitored, and must cover a number of areas:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Access and overreaching policies'''—These policies regulate email, password setting, acceptable use of resources, encryption key usage, and even security response and disaster-recovery processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Computer and server security policies'''—This area of policies covers issues such as server security, workstation security, software installation, facilities security, information logging, database access and credentials, and technology disposal.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Network security policies'''—These policies cover just about any risk associated with the networks that can be regulated by a policy, such as remote access, router and switch security, and wireless communication. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Application security policies'''—These policies cover topics such as access and control, the delineation of responsibilities for access to files and data, web application security, mobile device app security, and security tools. These policies might also regulate the use of open-source software and third-party code, and require that such code be contained in a secure software repository. In some organizations, these policies require cryptoroutines and scans that test for vulnerabilities with in the code.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of security policies is a difficult one for most CIOs. A lot of help is available for forming security policies that protect the organization; however, getting a policy to be followed throughout the enterprise can be extremely difficult. Compliance with security policies can be distressingly low in certain areas, such as policies associated with mobile device use and personal browsing on corporate workstations. This trend makes training of and frequent communication to all employees an essential part of policy enforcement, as is motivating the average employee to follow the rules.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Architecture and Models &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A ''security model'' is a representation of the enterprise's rules or policies about security, especially data access. The models don't tell an organization specifically how to design their security system. Instead, models provide a perspective on how to look at security for a system. A particular architecture might use several security models. There are many different security models and we cover a few here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''State machine model'''—To verify the security of a system, the state of the system is used. Therefore, all current permissions and accesses to information systems are captured. Systems that employ this model are in a secure state all the time.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bell-LaPadula model'''—This model was developed to address the leakage of classified information. It was the first rigorous model of a multilevel security policy used to define a ''secure state'' machine, and modes of access to information. In this model, users with different &amp;quot;clearances&amp;quot; have access to different levels of information.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Biba model'''—This model is similar to the Bell-LaPadula model. It addresses the integrity of data that is threatened when users at lower security levels are able to write to objects at higher security levels.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Clark-Wilson model'''—This model focuses on preventing authorized users from making unauthorized modifications to data, or committing fraud and errors within commercial applications. Rather than confidentiality, this model protects the integrity of the data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Information flow model'''—This type of model looks for insecure information flow. Insecure information flow can occur at the same level or between different levels until a restricted operation is attempted. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Non-interference model'''—This model ensures that any actions that take place at a higher security level do not affect or interfere with actions at a lower level. This model doesn't care about the flow of information, but what the user knows about the state of the system, especially about actions taken at a higher level.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Brewer and Nash model'''—This model is designed to provide access controls that can change dynamically depending on the user's previous actions. It prevents access to data that might be considered a conflict of interest. This model is used often in financial institutions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Graham-Denning model'''—This model creates rights for users that are associated with operations that can be executed on objects. In essence, it defines the &amp;quot;rights&amp;quot; that a user has to perform actions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Harrison-Ruzzo-Ullman model'''—This model specifies how access rights can be changed. It also specifies how objects can be created and deleted.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Classification for Levels of Access&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of access management is complex and can generate debates on specific details during the implementation of who can see what data and when. The ''how'' is often dictated by identity management systems already in place within the enterprise. However, these identity management systems often have the flexibility to design multiple discretionary frameworks, such as role-based and user-based security models. Access control policies need to take all forms of access control into consideration.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;One of the first functions of developing a security model is to determine the categories of users needed to ensure data is accessed on an as-needed basis. Role-based access control is a common method used for access control. Here are some of the most common roles:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Administrators'''—Administrators' capabilities can range from database administrators to file or storage administrators. However, software developers and network administrators may often have cross-domain responsibilities that require a high level of access. This level includes access to create, modify, and delete data, files, and configuration settings. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Power/super users'''—Power/super users is an optional level of security access that provides highly knowledgeable functional users with the authorization to access more service functions that their job function requires. This level adds mentoring or coaching to the duties of this role. Generally this type of user has access to all areas of a service if they are responsible for assisting or training others in that service. Another term for this type of user is ''functional lead''. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Primary functional users'''—Primary functional users have application and service authentication and access rights allowing them to perform the business functions needed to complete their daily tasks. These are end users that add and update records with the highest frequency of any user group. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secondary (casual) user types'''—Secondary or casual users are roles such as auditors and managers, or those given user IDs for one-time or temporary access, such as contractors or consultants. These roles usually have read-only access or may have access to very limited functions, such a reporting or expense submission.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Anonymous/read-only users'''—A final category is anonymous access to public information or read-only employee information, for users who need access to data, such as benefit or corporate reporting information. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Implementing and Maintaining Selected Security Controls&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;After the security controls are designed, they need to be put into operation. Implementing security controls is just like constructing and implementing any other EIT solution. The implementation has to be carefully planned and integrated into already existing hardware, software, processes, polices, and procedures. Luckily, it is usually the case that you can implement just one mitigation technique at a time, which means an organization can roll out a security plan in pieces, according to the priorities it has established. For example, one month an organization can implement new password policies and procedures. The next month, it upgrades all servers to a new version of the OS that contains new security features. And, one would expect that the security testing function is continuously improving over time.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each EIT department plays a role in integrating, monitoring, and maintaining the security plan.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''System administration'''—This department usually rolls out new versions of the operating systems and software, and ensures that the operational environments are configured in accordance with approved baselines and that all security updates are installed on devices in a timely manner.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Network services'''—It is their role to ensure that the network set up follows the security plan. Network services also need to monitor the network for any illegal traffic.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Customer service and technical support'''—This group's role is to help individuals follow the security policies and procedures. Often this includes teaching both in classroom base sessions as well as individual handholding.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Data administration and knowledge management'''—Data and knowledge administrators need to make sure that all data security controls are implemented on all databases and knowledge bases. In addition, they need to monitor databases constantly for any form of breach.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Systems security analysis'''—Systems security analysis is an ongoing concern. This group is in charge of detecting security breaches. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Security Monitoring, Accountability, and Testing &amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing security measures is an essential part of a security plan. You cannot verify that the plan is working unless you test whether the security measures (software, policies, and procedures) are working as the plan specifies. Unfortunately, even if the security system tests run without finding flaws, there is no guarantee that it is free of vulnerabilities. It is nearly impossible to test for all possible vulnerabilities; hackers seem to find new ones every day.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To test a security system, you have to design the tests to cover the [http://eitbokwiki.org/Glossary#ciatriad CIA triad (confidentiality, integrity, availability)]. In addition, the tests specifically need to cover authentication, authorization, and non-repudiation. Tests must cover the different areas of vulnerabilities, such as network security, system software security, client-side application security, and server-side security. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing and then forgetting doesn't work in security. The plan should provide required frequencies for conducting different tests on the system and for reporting the results. The security team needs to monitor the system to make sure that security measures (such as network settings) have not been changed and that vulnerabilities have not appeared. This is an ongoing maintenance issue, not a one-time verification of a system.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Accountability&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A major component of every security system is accountability. In this arena, ''accountability'' is the ability to trace all the actions performed on a device, within a process, or by a user. Techniques such as unique user identification (UUID) and authentication strongly support accountability. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Accountability is necessary to ensure that any attempted or committed security violation can be traced to the device on which it occurred and to the individual that committed the breach. Accountability enables the EIT organization to find those individuals that need to be held responsible for the damage. Without accountability, security monitoring has little purpose.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Vulnerability Testing Categories and Levels&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with all testing, the three standard categories of testing also apply to security: white box, gray box, and black box. ''White box testing'' is done with full knowledge of the system being tested—you know what you are looking for. ''Gray box testing'' is done with partial knowledge of the system. ''Black box testing'' is done with no knowledge of the system being tested, and testing for penetration is primarily black box testing. There are a number of testing phases or levels that mature security tests have. Some of them are automated and some are done by hand. Here are some of the most common levels:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Discovery'''—This phase identifies information systems and determines the technologies that are in use. It also determines, hosts, ports, and application entry points. A discovery process might find deprecated versions of software or firmware that are prone to attack, or it might find newly opened ports or entry points.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Vulnerability scan'''—This scan identifies known security issues with automated tools that look for specific conditions or situations that are known to indicate vulnerabilities. These scans can be run with or without credentials (which helps determine what parts of the enterprise can be accessed without an authorized login). &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Vulnerability scans'''—These scans can be manual or automated, and typically test for secure transmissions protocols, authentication vulnerabilities, session management vulnerabilities such as cookie scope and session termination timeouts, authorization vulnerabilities, data or file input vulnerabilities, and error-handling defects, among others. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration tests'''—These tests simulate an attack by a malicious hacker. Typically, these tests are performed by individuals who use complicated methodologies and problem-solving skills to penetrate an organization's security measures. These tests go beyond what automated tools are capable of doing.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Security review'''—This review verifies that the enterprise's policies and procedures are in place and are being used systematically throughout the organization. In addition, the reviewers need to verify that any required industry and governmental standards are being applied to each information system component.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When the series of tests is done, the team typically performs a series of risk assessments and audits. The team considers each finding and determines the seriousness of the vulnerability. The team might determine that in this context, an identified vulnerability is actually a false positive. At times, the team might even manually reproduce a vulnerability that was found with an automated system to verify the exposure. The resulting assessment report often lists the vulnerabilities by their seriousness and potential cost to the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;SecurityIncident&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;h2&amp;gt;Security Incident Response and Management&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Managing security incidents or events is just a special case of computer system or network management. The goal is to have a well-understood and predictable response to potentially damaging intrusions or events. There are a number of recommended incident management procedures that one can find with a simple search, but most are minor variations on a particular theme. In the discussion below, we have included the activities that are generally recommended and commonly included in an incident response plan.&amp;amp;nbsp;[[#Fifteen|[15]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:DetectEvent.jpg|700px]]&amp;lt;br /&amp;gt;'''Figure 3. Incident Response Plan'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Detecting the Event&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Detecting a security breach is often harder than it seems. Most companies don't know that they have been breached. The ones that do often find out days, weeks, or even months after the attack—just read about Target and their experience. They found out about the attack about a month after it occurred, despite their high-end antihacking operation. Event detection is difficult for two reasons. First, detection has become a far more complex task due to the increased size of attack surface, as systems have gotten more highly integrated and complex. Second, many companies are not using state-of-the-art detection software and programs.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As a result, detection is very difficult and detection technology is usually lagging behind the level of the most advanced hackers. In addition, most enterprises use detection methods that are only partially effective, at best. They don't keep up with the state-of-the-art detection software. Also, most enterprises do not perform a thorough analysis of the potential avenues of attack. If you don't understand where the attacks can occur, you can't put monitors in to detect them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are two great examples of this. First, in the case of the attacks on Target, there were point-of-sale terminals that were not being monitored as a point of attack. Second, in gas station skimmer attacks, credit card numbers are stolen by inserting a hardware device into the gas pump. The device actually powers itself with the pump's own electricity. The designer of the pump never considered this point of entry for an attack.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Over the last several years, detection methods have gone from signature or rule based to being behavior and analytics based. Most of the damage is done after the initial breach of the perimeter security, such as the corporate firewalls. So, it is now critical for organizations to have technology that can detect breaches (foreign activity) that occur behind the firewall. And these breaches often last for hours. There is significant evidence that one of China's cyberespionage units attacked 141 victim companies and stole multiple terabytes of data in attacks that lasted at least a year! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Assessing/Analyzing the Event&amp;lt;/h3&amp;gt; &lt;br /&gt;
&amp;lt;p&amp;gt;When the event has been detected, the security team needs to assess the event quickly to keep the damage from spreading. The team needs to determine whether the event is malicious or not and what type of event is it. It might be a denial of service, an access attack, or a reconnaissance attack, for example.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The team needs to determine as best as possible how the breach occurred. The attack could have come from outside the organization or from within. It could have been a piece of malware or an Internet worm running on one of the internal systems. They need to determine the particular system that was breached.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A quick assessment of what has been affected needs to be made to determine what data, software, or hardware has been breached or damaged. The initial assessment also needs to determine the severity of the attack. It could be just a nuisance, or it could be a serious threat to the business, staff, vendors, or customers. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Containing the Damage&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;After a basic assessment has been made, you need to take steps to contain the damage. What systems need to be brought down? Do workstations need to be confiscated? Does the organization's connection to the Internet need to be broken? Can you just limit third-party activity? Do you need to shut down wireless networks? Do you need to change passwords throughout the enterprise as fast as possible?&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Collecting and Protecting Evidence&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If the event is malicious, especially if it causes significant damage, it is critical to save the evidence. Obviously, the team needs to identify the type and severity of the compromise, and where the attack came from. The team also needs to save critical data to be used for forensic purposes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The organization's team might not have the capability to collect and protect the evidence; however, there are a number of companies that specialize in helping organizations with this process.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It is important to note that collecting and protecting the evidence usually slows down the recovery process; however, for a significant security breach, there is no question that it is the right thing to do.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Communicating to Those Affected&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It is critically important to communicate to those individuals who are affected by the event. This might mean sending an email to an employee because there is malware on their workstation. It might mean sending out email or letters to thousands of customers, because their credit card data has been stolen. And in most cases, it is critical to notify management. Incident response plans should include a table that indicates who should be notified given the type and complexity of the security incident. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Notifying Appropriate Agencies&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If the event is serious, the appropriate agencies need to be informed of the event. Contacting the organization's lawyer is likely the best first step. Determining the correct law enforcement agency to call is not always straightforward. In the USA, the FBI and Homeland Security are obvious choices for a foreign attack. For each country, the agencies are different, and it is important to determine which agencies the security team should call under particular conditions. All appropriate contact information needs to be part of the security plan. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Many organizations now have insurance coverage for cyberattacks. The corporate lawyer should know about that coverage. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Recovering Systems and Installing Permanent Fixes&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;At some point, when the emergency is over and the incident is reported, it is time to figure out how to get all the enterprise's systems back in running order, as described in the [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness chapter]. This might require changing software or hardware. It might require running malware-removal software throughout the organization. It might also require having everyone change passwords throughout the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Part of this system-recovery process should also involve putting in a permanent fix for the breach that was identified. This could mean installing patches to existing software or hardware, installing new intrusion-detection software, changing VPN protocols and procedures, or changing how sensitive data is stored. Often companies increase the level of encryption of the sensitive data. In any case, this is a time to plug the hole that was breached, and possibly plug a few others at the same time.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Compiling Incident Documentation with Damage Assessment&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with most catastrophic events, it is important to document the event thoroughly, so that you can treat it as a lesson learned. Every step of the event, the analysis, and the fixes should be documented and kept with the security plan. Along with that, the damage caused and the cost of repairing the damage should be calculated and documented.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;According to the New York Times&amp;amp;nbsp;[[#Seven|[7]]], the attack on Target cost the company a reported $148 million in direct costs, and cost financial institutions $200 million. In addition, Target's move to the chip-and-pin system, which is a more secure method for dealing with credit card data cost Target an additional $100 million, although the move to chip-and-pin was not a direct result of the breach. The company also spent $61 million in antibreach technology shortly following the attack. Even beyond those direct costs, profits fell 46 percent in the quarter following the announcement of the attack.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Review Incidents, and Updating Policies and Procedures&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Simply identifying the things that could have been done better with respect to the incident is not enough. It is critical for the enterprise to review current policies and procedures, and make changes that decrease security risks. These changes can be as simple as how often employees are required to change their passwords. It could be changes in VPN access rules, or it could be inserting a file encryption mechanism into many data transfer processes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Summary&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;EIT security is a major area of concern for CIOs. The area is changing on a daily basis. The attacks are becoming more frequent and more sophisticated. Often the security breaches are from within, whether intentional or not.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There is no way that a large enterprise can protect against all threats. Instead, an organization has to use its security resources in the most efficient way possible. To do that, the organization needs to inventory its computing assets, assess the risks and the related costs/damages of a security breach, and then make hard decisions about which risks to focus on and which to handle with less-rigorous methods, such as policies and procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It has become more and more important for organizations to understand their risk appetites, and truly weigh the potential security risks with providing new services and functionality to customers, vendors, and employees.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt; Key Maturity Frameworks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Capability maturity for EIT refers to its ability to reliably perform. Maturity is measured by an organization's readiness and capability expressed through its people, processes, data, and technologies and the consistent measurement practices that are in place. See [http://eitbokwiki.org/Enterprise_IT_Maturity_Assessments Appendix F] for additional information about maturity frameworks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Many specialized frameworks have been developed since the original Capability Maturity Model (CMM) that was developed by the Software Engineering Institute in the late 1980s. This section describes how some of those apply to the activities described in this chapter. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IT-Capability Maturity Framework (IT-CMF) &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The IT-CMF was developed by the Innovation Value Institute in Ireland. This framework helps organizations to measure, develop, and monitor their EIT capability maturity progression. It consists of 35 EIT management capabilities that are organized into four macro capabilities: &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing EIT like a business&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing the EIT budget&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing the EIT capability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing EIT for business value&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each has five different levels of maturity starting from ''initial'' to ''optimizing''. The three most relevant critical capabilities are information security management (ISM), risk management (RM), and personal data protection (PDP). &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Information Security Management Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the information security management (ISM) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The approach to information security tends to be localized. Incidents are typically not responded to in a timely manner. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Defined security approaches, policies, and controls are emerging, primarily focused on complying with regulations. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Standardized security approaches, policies, and controls are in place across the EIT function, dealing with access rights, business continuity, budgets, toolsets, incident response management, audits, non-compliance, and so on. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Comprehensive security approaches, policies, and controls are in place and are fully integrated across the organization. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Security approaches, policies, and controls are regularly reviewed to maintain a proactive approach to preventing security breaches. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Risk Management Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the risk management (RM) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are considered in an ad hoc manner, if at all. No risk-related roles are defined, or they are defined in an ad hoc manner. Risks are not actively or systematically managed. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program sits within the EIT function, and a basic framework is established. Responsibility and accountability for risk management are assigned to persons/roles in the EIT function. Some basic risk management approaches are established but these may not be consistently adhered to.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and supporting framework are established and consistently referenced in the EIT function and some other business units. Responsibility and accountability for risk management are assigned to dedicated persons/roles in the EIT function and other business units. Most risk management activities adhere to defined and documented approaches.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are established through the cooperation of, and in consultation with, the EIT function and the rest of the business. The risk management of EIT is integrated into wider ERM practices. Explicit risk management responsibility and accountability are assigned to employees across the organization. Compliance with the approaches, principles, and guidance for all risk management activities is mandated and enforced organization-wide.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are continually refined and updated, and involve regular cooperation with business ecosystem partners. Responsibility and accountability for risk management are dynamically assigned to the appropriate organization level, and regularly reviewed. Risk management approaches, principles, and guidance are continually reviewed and improved based on changes in the risk landscape, and learning from previous risk incidents. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Personal Data Protection Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the personal data protection (PDP) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;There is limited to no understanding of personal data protection obligations, and enforcement is ad hoc.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The EIT function has started rolling out personal data protection policies and procedures to meet high-priority legislative, regulatory, EIT and business needs. The risks associated with holding personal data have begun to reduce. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The management of personal data protection follows standardized policies and procedures across the EIT function and some other business units for most priority legislative, regulatory, EIT and business needs. The organization's reputation for managing personal data is growing. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The management of personal data protection follows comprehensive policies and procedures across the entire organization for all necessary legislative, regulatory, EIT, and business needs. The organization has a good reputation for managing personal data. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;There is a culture of proactive personal data protection across key business ecosystem partners. This is continually reviewed to ensure that the likelihood of personal data privacy violation remains low. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Key Competence Frameworks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While many large companies have defined their own sets of skills for purposes of talent management (to recruit, retain, and further develop the highest quality staff members that they can find, afford and hire), the advancement of EIT professionalism will require common definitions of EIT skills that can be used not just across enterprises, but also across countries. We have selected three major sources of skill definitions. While none of them is used universally, they provide a good cross-section of options. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100 percent correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings. Please take that in consideration as you review them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Skills Framework for the Information Age&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The Skills Framework for the Information Age (SFIA) has defined nearly 100 skills. SFIA describes seven levels of competency that can be applied to each skill. However, not all skills cover all seven levels. Some reach only partially up the seven-step ladder. Others are based on mastering foundational skills, and start at the fourth or fifth level of competency. SFIA is used in nearly 200 countries, from Britain to South Africa, South America, to the Pacific Rim, to the United States. (http://www.sfia-online.org)&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;SFIA skills have not yet been defined for this chapter.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Description&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;10%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Competency Levels&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information assurance&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The protection of integrity, availability, authenticity, non-repudiation, and confidentiality of information and data in storage and in transit. The management of risk in a pragmatic and cost-effective manner to ensure stakeholder confidence.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;5-7&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information security&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The selection, design, justification, implementation, and operation of controls and management strategies to maintain the security, confidentiality, integrity, availability, accountability, and relevant compliance of information systems with legislation, regulation, and relevant standards.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;3-7&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Penetration testing&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The assessment of organizational vulnerabilities through the design and execution of penetration tests that demonstrate how an adversary can either subvert the organization's security goals (e.g., the protection of specific intellectual property) or achieve specific adversarial objectives (e.g., establishment of a covert command and control infrastructure). Pen test results provide deeper insight into the business risks of various vulnerabilities.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;4-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Digital forensics&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The collection, processing, preserving, analyzing, and presenting of computer-related evidence in support of security vulnerability mitigation and criminal, fraud, counterintelligence, or law enforcement investigations.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;4-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Security administration&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The provision of operational security management and administrative services. This typically includes the authorization and monitoring of access to EIT facilities or infrastructure, the investigation of unauthorized access, and compliance with relevant legislation.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;1-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;European Competency Framework&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The European Union's European e-Competence Framework (e-CF) has 40 competences and is used by a large number of companies, qualification providers, and others in public and private sectors across the EU. It uses five levels of competence proficiency (e-1 to e-5). No competence is subject to all five levels.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The e-CF is published and legally owned by CEN, the European Committee for Standardization, and its National Member Bodies (www.cen.eu). Its creation and maintenance has been co-financed and politically supported by the European Commission, in particular, DG (Directorate General) Enterprise and Industry, with contributions from the EU ICT multi-stakeholder community, to support competitiveness, innovation, and job creation in European industry. The Commission works on a number of initiatives to boost ICT skills in the workforce. Version 1.0 to 3.0 were published as CEN Workshop Agreements (CWA). The e-CF 3.0 CWA 16234-1 was published as an official European Norm (EN), EN 16234-1. For complete information, see http://www.ecompetences.eu. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;85%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;e-CF Dimension 2&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;e-CF Dimension 3&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;D.1. Information Security Strategy Development (ENABLE)&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;Defines and makes applicable a formal organizational strategy, scope, and culture to maintain the safety and security of information from external and internal threats, i.e., digital forensic for corporate investigations or intrusion investigation. Provides the foundation for information security management, including role identification and accountability. Uses defined standards to create objectives for information integrity, availability, and data privacy.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Level 4-5&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;E.8. Information Security Management (MANAGE)&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;Implements information security policy. Monitors and takes action against intrusion, fraud, and security breaches or leaks. Ensures that security risks are analyzed and managed with respect to enterprise data and information. Reviews security incidents, and makes recommendations for security policy and strategy to ensure continuous improvement of security provision.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Level 2-4&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;i&amp;amp;nbsp;Competency Dictionary &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The Information Technology Promotion Agency (IPA) of Japan has developed the i&amp;amp;nbsp;Competency Dictionary (iCD) and translated it into English, and describes it at https://www.ipa.go.jp/english/humandev/icd.html. The iCD is an extensive skills and tasks database, used in Japan and southeast Asian countries. It establishes a taxonomy of tasks and the skills required to perform the tasks. The IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The iCD consists of a Task Dictionary and a Skill Dictionary. Skills for a specific task are identified via a &amp;quot;Task x Skill&amp;quot; table. (See [http://eitbokwiki.org/Glossary Appendix A] for the task layer and skill layer structures.) EITBOK activities in each chapter require several tasks in the Task Dictionary. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The table below shows a sample task from iCD Task Dictionary Layer 2 (with Layer 1 in parentheses) that corresponds to activities in this chapter. It also shows the Layer 2 (Skill Classification), Layer 3 (Skill Item), and Layer 4 (knowledge item from the IPA Body of Knowledge) prerequisite skills associated with the sample task, as identified by the Task x Skill Table of the iCD Skill Dictionary. The complete iCD Task Dictionary (Layer 1-4) and Skill Dictionary (Layer 1-4) can be obtained by returning the request form provided at http://www.ipa.go.jp/english/humandev/icd.html. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Task Dictionary&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th colspan=&amp;quot;3&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Dictionary&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;30%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Task Layer 1 (Task Layer 2)&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Classification&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Item&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;40%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Associated Knowledge Items&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Information security operation management &amp;lt;br /&amp;gt;(EIT operation control)&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Basic security technology&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information security&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; &amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of PKI technology trends&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Access control (authentication, log monitoring, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Rules on installing applications (rules on the installation and use of applications on machines connected to the network)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Application security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Installation and administrative rules for public Internet servers (rules on installation standards and operational management of servers to be connected to the Internet)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Rules on Internet use (rules on the use of email and Internet access from the company)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operational rules for measures against computer viruses (rules relating to measures against computer viruses for machines that exchange data externally)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Standards for measures against computer viruses&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Standards for measures against unauthorized access to computers&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of single sign-on technology trends&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of technology trends in security administration&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security tools (free, commercial)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security test items&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data protection (encryption, transmission, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Network protection (firewalls, intrusion detection, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of firewall technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Malware (viruses, spyware, worms, adware)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Encryption (DES)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Encryption (RSA)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptography (common key, public key, private key, RSA, AES, hybrid encryption, hash functions, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Public key infrastructure (PKI, certificate authorities, digital certificates, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Attack methods (SQL injection, cross site scripting, DoS attack, phishing, targeted attacks, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Confidentiality, integrity, and availability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of technology trends in intrusion prevention&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Government public key infrastructure (GPKI, bridge certification authority, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Biometric authentication technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Vulnerability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright protection (CPRM)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright protection (CSS)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of electronic signature technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication technology (digital signatures, message authentication, time stamps, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;User authentication (ID, password, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Key Roles&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;These roles are common to ITSM.&amp;lt;/p&amp;gt; &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Compliance Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enterprise Architect&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Information Security Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Risk Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Service Design Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Analyst&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Other key roles include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Chief Information Security Officer&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data architect &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data owner&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operations Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Standards&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27013, Information technology—Security techniques—Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000–1&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27000:2016, Information technology—Security techniques—Information security management systems—Overview and vocabulary (this is the general overview to the ISO/IEC 27000 series of over 30 standards on information security management systems, and terms and definitions commonly used in the ISMS family of standards).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001:2013, Information technology—Security techniques—Information security management systems—Requirements&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27002:2013, Information technology—Security techniques—Information security management systems—Code of practice for information security controls&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 15408:2009, information technology—The common criteria for Information Technology Security Evaluation as an international standard for computer security certification. Establishes the general concepts and principles of EIT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408, which is its entirety is meant to be used as the basis for evaluation of security properties of EIT products.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC/IEEE 15026, System and software engineering—Systems and software assurance (4 parts)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Federal Information Processing Standards (FIPS) 140 series—These publications are computer security standards created by the US government specifically concerning cryptographic modules. FIPS 140-2 defines four levels of security and sets requirements in 11 different cryptographic areas including roles, services and authentication, physical security, design assurance, and cryptographic module ports and interfaces.&amp;amp;nbsp;[[#Fourteen|[14]]]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;References&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;One&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[1] ISO/IEC 27000:2014 definition of &amp;quot;information security.&amp;quot;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Two&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[2] ISO/IEC 27001:2013, Information technology—Security techniques—Information security management systems—Requirements.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Three&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[3] ISO/IEC 27002:2013, Information technology—Security techniques—Information security management systems—Code of practice for information security controls.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Four&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[4] J.D. Meier, A. Mackman, S. Vasireddy, et al. ''Improving Web Application Security: Threats and Countermeasures'', http://www.cgisecurity.com/lib/Threats_Countermeasures.pdf, June 2003.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Five&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[5] IAPP Information Privacy Certification Glossary of Common Privacy Terminology https://iapp.org/media/pdf/certification/CIPP_Glossary_0211updated.pdf, 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Six&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[6] Information Technology—Security techniques—Privacy framework, ISO/IEC 29100:2011; http://a-infosec.com/2014/01/25/public-available-of-isoiec-291002011-privacy-framework/&lt;br /&gt;
&amp;lt;div id=&amp;quot;Seven&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[7] Rachel Abrahms, ''Target Puts Data Breach Costs at $148 Million, and Forecasts Profit Drop'', New York Times, http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0, August 2014.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Eight&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[8] ''What is Build Security In?'' https://buildsecurityin.us-cert.gov/&lt;br /&gt;
&amp;lt;div id=&amp;quot;Nine&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[9] Dimensional Research, ''The Impact of Mobile Devices on Information Security: A Survey of IT Professionals'', https://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf, June 2013.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Ten&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[10] Phil Brit, ''10 Trickiest Mobil Security Threats'', eSecurity Planet, April 2015.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Eleven&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[11] OWASP, Top 10 2013, https://www.owasp.org/index.php/Top_10_2013-Top_10&lt;br /&gt;
&amp;lt;div id=&amp;quot;Twelve&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[12] CWE/SANS, ''CWE/SANS Top 25 Most Dangerous Software Errors'', https://www.sans.org/top25-software-errors/, June 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Thirteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[13] ITU-T, ''Common vulnerabilities and exposures'', http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=11061, April 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fourteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[14] NIST Federal Information Processing Standards (FIPS) Publications, Feb 2013; http://csrc.nist.gov/publications/PubsFIPS.html.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fifteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[15] M. West-Brown, D. Stikvoort, KP Kossakowski, et. al., ''Handbook for Computer Security Incident Response Teams (CSIRTs)'', MU/SEI-2003-HB-002, Carnegie Mellon University, http://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf, April 2003.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Sixteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[16] CSO Staff, ''The security laws, regulations, and guidelines directory'', December 2012, http://www.csoonline.com/article/2126072/compliance/the-security-laws—regulations-and-guidelines-directory.html.&lt;br /&gt;
&amp;lt;h2&amp;gt;Related and Informing Disciplines&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Physical and facilities security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Personnel security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transportation security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Retail security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Manufacturing security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insurance and financial services security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Healthcare security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Utilities security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code analysis tools&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging and tracing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Biometric authentication&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright and intellectual property protection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Additional Reading&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;DHS: &amp;quot;IT Security Essential BoK, A Competency and Functional framework for IT Security Workforce Development,&amp;quot; http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2007-12/ISPAB_Dec7-BOldfield.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;NIST, Special Publication 800-37 (Revision 1), &amp;quot;Guide for Applying the Risk Management Framework to Federal Information Systems,&amp;quot; February 2010.&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Security&amp;diff=1870</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Security&amp;diff=1870"/>
				<updated>2017-12-19T23:25:18Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki. Like all wikis, it is a work in progress and may contain errors. We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Introduction&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;There are only two types of companies: those that have been hacked, and those that will be.&amp;quot; &amp;lt;br /&amp;gt;~ FBI Director Robert Mueller, October 2012&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know that they've been hacked by the Chinese.&amp;quot; &amp;lt;br /&amp;gt;~ FBI Director James Comey, October 2014&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Whether you call it computer security, cybersecurity, or EIT security, one thing is true, technological security is a rapidly changing area. The change is so rapid that it is nearly impossible for organizations (whether commercial, educational, or governmental) to keep up with the perpetrators of cyberattacks. Attacks that used to be carried out by lone individuals trying to see if they could get access to &amp;quot;secure&amp;quot; servers are now being organized and financed by governments. The way that an organization approached security in 2005 isn't sufficient in 2017, and we are pretty sure that it will be a totally different world in 2025. Flexibility and adaptability in this area is essential. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Organizations (both small and large) depend on information technology and the information systems that are developed to successfully carry out their missions and business functions. Information systems can include a vast range of diverse computing platforms from high-end supercomputers and highly virtualized platforms to tablets and mobile devices. Information systems also include specialized systems and devices, such as telecommunication systems, industrial/process control systems, testing and calibration devices, weapons systems, command and control systems, and environmental control systems. '''All of these systems are subject to serious threats''' that can have adverse impacts on organizational operations, assets, individuals, associated organizations, and even countries by compromising the confidentiality, integrity, or availability of information being processed, stored, or transmitted by those systems.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Threats to information and information systems include environmental disruptions, human and machine errors, and purposeful attacks. Cyberattacks on information systems today are often aggressive, disciplined, well-organized, long-term, well-funded, and in a growing number of documented cases, extremely sophisticated. Successful attacks on public and private sector information systems (especially toward critical infrastructure) can result in serious damage not only to the organization that was attacked, but also to the national and economic security interests of an entire country.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;We make an attempt in this chapter to describe EIT security as we know it today. We highlight the current challenges and indicate some of the most successful processes that enterprises use in this ongoing battle.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Goals and Principles&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While there are many definitions for security, most include the three dimensions of [http://eitbokwiki.org/Glossary#ciatriad confidentiality, integrity, and availability] (sometimes referred to as the ''CIA triad''). As such, the primary goal of EIT security is to preserve the ''confidentiality, integrity, and availability of information and information systems''.&amp;amp;nbsp;[[#One|[1]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The principles behind an organization's [http://eitbokwiki.org/Glossary#isms information security management system (ISMS)] &amp;amp;nbsp;[[#Two|[2]]]should be to design, implement, and maintain a coherent set of policies, processes, and systems that keep the risks associated with its information assets at a tolerable level, and yet, manage the cost and inconvenience of said risk management. As such, the goals of EIT security are to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Always understand the current risk tolerance of the enterprise with respect to information and device security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understand the security threats and potential damages to information, devices, and individuals.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Create and follow policies and procedures that keep cyberattack risk and damages at or below a tolerable level.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Effectively and efficiently detect and deal with cyberattack incidents.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Context Diagram&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:05 Security CD.png|700px]]&amp;lt;br /&amp;gt;'''Figure 1. Context Diagram for Security'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Information Security Management&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;An information security management system (ISMS) includes policies, processes, procedures, organizational structures, software, and hardware to protect the identified information assets. These controls need to be specified, implemented, monitored, reviewed, and improved where necessary, to ensure that the specific information security and business objectives of the organization are met. Relevant information security controls are expected to be seamlessly integrated with an organization's business processes.&amp;quot; ~ ISO/IEC 27002:2013, Clause 3.2.3 Information security, Pg. 26&amp;amp;nbsp;[[#Three|[3]]]&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An ISMS must remain in place and be effective for a long period of time; however, it must also be able to adapt to changes in the EIT organization and the solutions that it supports, as well as evolving security threats. As a result, the ISMS must be carefully designed, implemented with care, strongly managed, and continuously reevaluated and updated.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Management Practices and Frameworks&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A mature ISMS uses an information security framework to achieve the enterprise's objectives. Such a framework is a series of documented processes that are used to define policies and procedures that support the implementation and ongoing management of information security controls. A framework is basically a blueprint for building an information security program to manage risk and reduce vulnerabilities, and to define and prioritize the tasks required to build security into an organization.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are several mature information security frameworks, including the following more widely used frameworks:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''ISO/IEC 27000 Series'''—The International Organization for Standardization (IOS) and the International Electrotechnical Commission (IEC) provide recommended practices on information security management and program elements. ISO defines the broadest structure of an effective overall program, supporting information security as a systems issue that includes technology, practice, and people. It also describes the need for a formal security program.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''NIST SP 800 Series'''—The National Institute of Standards and Technology (U.S. Department of Commerce) has produced a number of special publications (the 800 series) that are specifically focused on computer security. This series discusses the Information Technology Laboratory's research, guidelines, and outreach efforts concerning computer security, along with its collaborative activities with industry, government, and educational institutions. Some examples of these collaborations include catalogs of security controls for information systems (800-53).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''COBIT'''—The Control Objectives for Information and Related Technology (COBIT) is a set of mythologies and practices for EIT management that focuses on defining program and management control functions. Use of these standard practices can help ensure that EIT programs are implemented and managed effectively. COBIT states that the security publication &amp;quot;provides guidance to help EIT and security professionals understand, utilize, implement, and direct important information-security-related activities, and make more informed decisions while maintaining awareness about emerging technologies and the accompanying threats.&amp;quot;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Information Security Forum's Standard of Good Practice'''—This document is a comprehensive, business-focused guide to managing information security risks. It is aligned with the requirements for an ISMS as described in the ISO/IEC 2700X standards. It provides deeper coverage for most of the control topics.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''ISACA RISK IT'''—The Information Systems Audit and Control Association (ISACA) has produced a Risk IT framework that aims to fill the gap between generic risk management frameworks and more specific EIT risk management frameworks. It provides a wide view of all risks related to EIT and a similarly thorough treatment of risk management. It builds upon the other risk-related components within the current ISACA frameworks, such as COBIT and Val IT.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''OCTAVE'''—The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) method is used to assess an organization's information security needs. OCTAVE methods are self-directed and flexible. Small teams across business units and EIT can work together to address the security needs of the enterprise. OCTAVE can be customized to match the organization's unique risk environment, security and resilience objectives, and skill level. OCTAVE moves an organization toward an operational risk-based view of security and puts it in a business context.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''COSO'''—The Committee of Sponsoring Organizations (COSO) of the Treadway Commission has created a list of control objectives for enterprise governance and risk management. COSO defines a set of business, management, and security-relevant controls that can be used to demonstrate good business practices, and can be used to show compliance with Sarbanes-Oxley.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''HITRUST CSF'''—This is a certifiable framework that provides healthcare-relevant security regulations and standards. It describes a flexible approach to risk management and compliance for the HIPAA and HITECH regulations (described later). At the present time, it is the most widely adopted security framework by the US healthcare industry.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;The Cybersecurity Laws and Regulations Factor&amp;lt;/h3&amp;gt; &lt;br /&gt;
&amp;lt;p&amp;gt;An ISMS cannot be constructed without considering the laws and regulations that affect the enterprise. The issue here is that those laws and regulations are under constant flux. When investigating cybersecurity laws and regulations, we have to look at local, state, national, and international regulations. We also have to consider regulations specific to the enterprise's industry, such as health care. For larger organizations that have significant risk, security lawyers may be required to identify relevant regulations and to keep track of new legislation. Here is a brief overview.&amp;amp;nbsp;[[#Sixteen|[16]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each country has its own laws, and those laws differ a great deal. Over the last several years, the UN has taken up the issue of cybersecurity. In 2013, the United Nations Group of Governmental Experts (GGE) published a report that listed a set of &amp;quot;high-level cyber norms&amp;quot; that all countries should follow. They include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Abide by international law when operating in cyberspace.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Honor the &amp;quot;norm of state responsibility&amp;quot; for cyberattacks emanating from their territory.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Work to develop confidence-building measures to reduce risk of conflict.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Engage in capacity-building efforts to assist developing countries build skills to protect their networks and citizens.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The GGE meets fairly regularly to build on their work and have recently taken on defining limits on the use of national cyberpower aimed at the critical infrastructure of other states.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Laws and Regulations Outside the United States&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As mentioned above, cybersecurity is a fast-changing area globally. Although the US, China, and Russia have been considered in the lead, most countries have basic cybersecurity laws and policies. Many of those are associated with the country's national security and defense strategies. It would take too long to go through every country, so we have picked a few to discuss. For information about specific countries and their policies and security strategies, visit https://ccdcoe.org/cyber-security-strategy-documents.html.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''China'''—China has a set of the world's tightest Internet restrictions and this is part of their cybersecurity strategy. They have numerous laws that authorize the control of flow of online information in the country and many foreign sites are blocked. Laws also require companies to censor and restrict online anonymity, to store user data in China, and to monitor and report all network security incidents. China is serious about security and jails more people for computer &amp;quot;misuse&amp;quot; than any other country; however, most of the people are arrested as part of their censorship laws, not cybercrimes. Blogs and social-site posts critical of the government usually result in an arrest. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Russia'''—Like China, for many years Russia was worried about cybercontent (the information) more than cybersecurity. However, they have not overtly censored social media or blogs, like the Chinese. In addition, they have maintained a strict &amp;quot;non-interference&amp;quot; policy concerning their cyberspace, which has pushed them to create numerous international non-interference pacts. Russia has well-developed tools for incident detection and is also considered a leader in developing software and techniques for cybercrime. Interestingly enough, it has only been since 2012 or so that Russia started to take cybercrimes committed by Russians seriously.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The European Union'''—In 2013, the European Commission and High Representative's ''Cyber Security Strategy'' document was the first comprehensive EU document concerning cyberspace. It set the tone of the EU's strategy as &amp;quot;open, safe, and secure,&amp;quot; and it specified how the EU would approach building their cybersecurity capacity. In August 2015, the EU proposed a strict law to impose security requirements on Internet service providers and web companies. The new law also requires reporting data breaches to EU governments. One of the critical points brought up in the deliberations of the law is that if a cloud computing company or ISP does business with a &amp;quot;critical sector&amp;quot; company, the web company needs to follow the same security rules as the critical sector company.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Laws and Regulations in the United States&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;National Laws and Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Over the last 15 year, the US federal government has lead the way in developing laws and regulations regarding cyberhacking and cybersecurity. The laws treat different organization types differently, so some enterprises are strongly affected by cybersecurity laws and regulations while other are not affected at all. Despite the fact that most people believe that cybersecurity regulations are necessary, there is a lot of disagreement about who these laws should regulate. Some people believe that laws should cover only acts of breaching security (hacking). Others think that there should be laws to regulate businesses and how they protect data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In the US, cybersecurity regulation consists of directives (both administrative directives and legislation) that safeguard information technology and computer systems. The purpose of these directives is to force companies and organizations to protect their systems and information from cyberattacks, such as viruses, worms, Trojan horses, phishing, [http://eitbokwiki.org/Glossary#dos denial-of-service (DOS)] attacks, unauthorized access (stealing intellectual property or confidential information), and control system attacks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Most regulations encourage the use of measures that are designed to prevent cyberattacks, including firewalls, antivirus software, intrusion detection and prevention systems, encryption, and login passwords.&amp;amp;nbsp;[[#Two|[2]]] For most industries, these measures are currently voluntary. There are three regulations that mandate healthcare organizations, financial institutions, and federal agencies protect their systems and information: the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although the mandates only cover a few industries right now, many industry regulators are planning to include cybersecurity measures as a part of their standard regulatory examinations in the near future.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;State and Local Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;State governments have attempted to improve cybersecurity by increasing public visibility of firms with weak security. In 2003, California passed the Notice of Security Breach Act and California Assembly Bill 1958, which requires that any company maintaining personal information (name, social security number, driver's license number, credit card number, or financial information) of California citizens that has a security breach must disclose the details of the event. In 2004, California passed California Assembly Bill 1950, which also applies to businesses that own or maintain personal information for California residents. This regulation dictates that businesses maintain a reasonable level of security and that these required security practices also extend to business partners. These security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. Many other states have passed similar laws. The problem with many of these laws is that they use the phrase &amp;quot;reasonable level of security.&amp;quot; This phrase gives businesses too much room for interpretation. In addition, it is unclear whether organizations can actually be held accountable in court.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h5&amp;gt;Privacy Laws and Regulations&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As mentioned above, the number of laws and regulations concerning data security are increasing over time. Privacy of customer transactions, whether a purchase or some other action, is considered the ethical responsibility of EIT by most governing bodies these days. This is a huge area of vulnerability for many enterprises, and many cybersecurity experts believe that litigation associated with privacy and data protection breaches are going to increase significantly in the near future.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The International Association of Privacy Professionals (IAPP) glossary&amp;amp;nbsp;[[#Five|[5]]] defines privacy as: ''The appropriate use of personal information under the circumstances. What is appropriate will depend on context, law, and the individual's expectations; also, the right of an individual to control the collection, use and disclosure of information.'' Data protection is defined as the management of personal information.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In the United States, ''privacy'' is the term that is used in policies, laws, and regulation. However, in the European Union and other countries, the term ''data protection'' often identifies privacy-related laws and regulations. Because of the different levels of regulation, international agreements have come into existence to manage compliance between countries and regions. The best known example being the US-EU Safe Harbor Principles, which streamline compliance for US companies attempting to meet the EU directive (95/46/EC) on protection of personal data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The regulations associated with privacy are changing frequently, but the most common US laws are listed below.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Healthcare providers, payers, clearinghouses, and similar organizations must comply with a set of government regulations such as the '''Health Insurance Portability and Accountability Act (HIPAA)''' and the '''Health Information Technology for Economic and Clinical Health Act (HITECH)'''. Over the years, enforcement for violations of both of these acts has been strengthened, and incentives have been put in place for the adoption of a secure electronic health records act to protect personal health information.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The '''Gramm-Leach-Bliley Act''' requires financial institutions that offer consumers financial products or services to safeguard sensitive client data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The '''Payment Card Industry Data Security Standard (PCI-DSS)''' is a common set of security controls for protecting credit card information maintained by the PCI Security Standards Council. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Consent management''' is the newest level of privacy legislation coming into effect, which has steep fines for non-compliance distribution of content.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Data and privacy protection is important to most other countries and regulations have been uniformly increased around the world in the last few years:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The EU Data Protection Directive has been in place since 2011, and will be updated by the end of 2015 to Directive 95/46/EC. It will likely be one of the strongest sets of regulations to protect personal data in the world. Its primary goal is to bring all EU nations into alignment with respect to data protection and to raise every member country's standards, but it will also lay the groundwork for fining companies that do not comply with the new regulations. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;In 2014, Australia amended its Privacy Act to cover cloud and communications service providers and any other organizations that collect, process, or store personal information. As with many of the policies of other countries, not only does this amendment increase coverage of the law to global service providers, it enables the Australian Information Commissioner to monitor how companies comply with the policy, train their staff, and handle incidents and complaints.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;More about Privacy and Data Protection&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;ISO/IEC 29100&amp;amp;nbsp;[[#Six|[6]]] identifies a number of what they call privacy principles that should be followed by all organizations that handle personal information:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The owner of the data must have consent and choice.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The user of the data must specify their use and demonstrate legitimacy of purpose.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The collection of data must be limited to the specified purpose.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The data kept should be minimized to just what is needed.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The data use and retention should be limited and disclosed.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization should be able to ensure the accuracy and quality of the data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization should demonstrate openness, transparency, and notice.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization must be accountable.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization needs to provide a reasonable amount of information security.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The organization must be compliant with all privacy laws and regulations.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Establishing Enterprise-Wide Security&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Establishing an effective enterprise-wide security program is a critical and difficult task. It requires both careful assessment of the enterprise's current situation, and an understanding of the organization's tolerance for risk. When those things are understood, a plan needs to be developed that covers all departments of the enterprise, as well as staff, vendors, and clients.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Enterprise-Level Vulnerability Assessment and Risk Tolerance&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;Risk management is the process for identifying, analyzing, and communicating risk and accepting, avoiding, transferring, or controlling it to an acceptable level considering associated costs and benefits of any actions taken.&amp;quot;'' ~ DHS Risk Lexicon, 2010 Edition&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of vulnerability assessment and risk management is a key security competency for all enterprises. Risk management is more than just looking for vulnerabilities and then planning how to protect against them. There are two factors to consider. First, an organization could just shut down access to systems to control threats, but that likely does not meet the business's objectives and purpose for existence. For example, an online store has to provide access to its customers, and therefore has significant vulnerabilities by definition. Second, no institution can afford to be completely secure—if that is even possible. So, the risk management area is a balancing act; one that requires careful technical and cost/benefit analysis. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As such, listing an organization's vulnerabilities isn't good enough. Instead, it is critical to understand three other factors:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The potential cost in damages of each identified risk/threat (monetary, disruption of business, and loss of trust by customers, vendors, and other associates)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The probability of the each identified risk to occur (which changes over time)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The means and costs of protection (or mitigation) from the threat&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When you have thoroughly analyzed each threat, you can prioritize the organization's efforts in protecting against or mitigating the threats.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Maybe just as important as performing a risk analysis is understanding the organization's risk appetite (or risk aversion). The organization needs to understand how much risk it is willing to take, along with what types of damage are tolerable and intolerable. And, it is also critical to understand how much the organization can afford to protect against the threats. The organization's lawyers need to be engaged to identify and evaluate potential litigation risks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Internal risk comes from three sources: the technology, the organization's standard procedures, and the staff. All of these change constantly, so security planning and policy development is a non-stop process. The technology (software and hardware) is in a constant state of flux. Although often overlooked, the lack of carefully designed policies and operating procedures open up the enterprise to a number of threats and losses. Finally, an organization's own employees, consultants, and vendors are sources of exposure to breaches of security. According to analysts, insiders are responsible for more security violations and breaches than all the other sources of harm combined.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Developing a Security Plan and Program&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An effective security program requires a comprehensive security plan. The security plan should cover all security functions, areas, processes, policies, and procedures. It needs to be specific, clear, and well organized. The activities associated with developing a security plan and program are discussed below.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:SecurityPlanDevelopment.jpg|700px]]&amp;lt;br /&amp;gt;'''Figure 2. Security Plan Development'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Define specific security goals'''—The goal of this activity is to define or frame measurable EIT security goals. These goals must be in complete alignment with the enterprise's security objectives and with the risk tolerance of the organization. They also need to be specific, detailed, and measurable. Security goals should typically cover the following areas:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Identifying, prioritizing, and addressing security gaps&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Tool purchase and development&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Law and regulation compliance&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat detection and response&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ongoing training and certification for security personnel&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Ongoing training of non-security personnel&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Continuous communication of program goals and potentials for exposures&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Categorize and assess information assets'''—This activity involves creating a comprehensive catalog of the organization's information assets. Each asset must be evaluated with respect to the value of its information to the organization and the cost of potential damage, whether that damage is due to a leak of information, actual damage to the systems or information, or a lack of availability for a short or extended period of time. In addition, the report should list the acceptable level of exposure to risk for the asset (loss, damage, unauthorized access) and the acceptable constraints that can be placed on the asset by the technology and policies designed to keep it secure.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Design alternative risk controls'''—There are a number of alternatives available for protecting information assets. Each alternative has its strengths and weakness with respect to the enterprise's strategic and security goals. Each alternative also has its associated implementation and maintenance costs. By setting priorities and managing costs, the team can build an effective security architecture that contains routine electronic and process-based actions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Implement and communicate selected controls'''—Implementing the controls is often more than just installing security software and establishing security-related policies and procedures. Often general controls must be customized for the specific threat and information asset that they are meant to address. In addition, the controls need to be an integral part of the processes or assets that they support. Simply adding them on and expecting them to be used or followed is wishful thinking.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Test controls'''—The organization needs to create an assessment method to evaluate the effectiveness of the implemented controls. These come in the form of prearranged tests and reviews that ensure that the controls are protecting the assets as designed. The testing process should also assess whether policies and procedures are being followed by employees. If an organization doesn't test its controls, it can't certify to any governing body that its controls are effective. In some industries, being able to demonstrate that you are in compliance is critical. For other industries, it's just good business.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Detect and address security incidents'''—Finally, an organization needs to detect when security breaches occur and deal with those breaches in an effective and efficient manner. We discuss this subject at length in the [[#SecurityIncident|Security Incident Response and Management]] section.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;The Ongoing Security Planning Cycle&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 5em;&amp;quot;&amp;gt;&amp;lt;p&amp;gt;''&amp;quot;The risk management process is a continuous process for systematically addressing risk throughout the lifecycle of a system, product, or service.&amp;quot;'' &amp;lt;br /&amp;gt;~ ISO/IEC 16085:2006 Systems and software engineering—Lifecycle processes—Risk management, 3.12&amp;lt;/p&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Because security is now an aspect in the lifecycle of all systems and services provided by an organization, the planning cycle is never over. Each time an organization fields a new capability, security must be considered. Even when maintaining an old system, security planning is involved. In addition, new threats and vulnerabilities are regularly identified, which requires an organization to constantly update their security capabilities. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The result is that organizations need to continuously take inventory, analyze, design, implement, and test their security system—and update the security plan accordingly. This ongoing process makes it essential to implement some kind of continuous improvement program that allows the organization to adapt to change quickly. This activity needs to be part of the overall security program.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Here are some of the most often used processes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''[http://eitbokwiki.org/Glossary#pdca Deming Cycle (plan, do, check, act)]'''—The PDCA process was incorporated into ISO/IEC 27001:2005 as the preferred risk management processes. This cycle contains four steps:&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Plan'' phase—Design the ISMS by assessing information security risks and then selecting the appropriate controls for the risks.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Do'' phase—Implement and use the security controls.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Check'' phase—Review and evaluate the effectiveness and efficiency of the ISMS.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Act'' phase—Modify the ISMS as necessary to improve effectiveness or efficiency. &amp;lt;/li&amp;gt;&amp;lt;/ol&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''[http://eitbokwiki.org/Glossary#dmaic Six Sigmas DMAIC (define, measure, analyze, improve, control)]'''—This process refines the Deming Cycle and is a data-driven quality strategy for improving a process that is often customized for use by security departments.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Information Security Forum's SOGP (Standard of Good Practice)'''—This document is a comprehensive, business-focused guide to managing information security risks. One of its sections discusses good practices with respect to security risk management. It also discusses the details of policies, standards, and procedures.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Security Education and Training&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;An essential part of any ISMS is the organization's security training program. These training programs often come in several different levels that match the sophistication and job function of employees. Security training is not just for those individuals actively involved in designing, implementing, and monitoring the security program—it is for all employees. A large number of security breaches are linked to employees' actions. Security threats cannot be totally addressed through security software and hardware—the human factor has to be addressed. Employees need to modify their standard operating behavior to reduce overall exposure to attacks—new security policies and procedures must be followed. As a result, security training programs need to be comprehensive and applied throughout the workforce. A good source of free online video training is at https://www.csiac.org/series/information-awareness-videos/. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Security training programs need to instruct even low-level workers about their security responsibilities and teach them about information security processes and procedures that are appropriate for their job function. These programs are often referred to as ''security awareness programs''. Among other topics, security awareness programs cover how to avoid threats and attacks associated with:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Email and IM&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Browsers&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Inadequate passwords&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Mobile devices &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Lack of encryption&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Not only do employees need to be taught about the vulnerabilities associated with different tasks, such as reading email, but they also need to be given the tools to minimize the threats. A program should exist to keep the training and the tools up to date as part of the ongoing organizational processes. In addition, non-technical employees need to be motivated to follow the enterprise's security procedures; otherwise, they will not do so.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Training for more technical individuals needs to address the technical aspects of preventing security breaches. For example, security training for the programming staff should include information about how to conduct a code review to identify vulnerabilities in the code.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The training for the security team needs to be the most comprehensive, and it also needs to be continuous. As attacks become more sophisticated, the training level of the security staff needs to keep up. The constant change in every area of security is what drives specialization. The advanced training classes often focus on only one area, such as data security or defense against denial of service attacks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The training function needs to be accountable and reviews need to be conducted regularly. Measure the effectiveness of the training from both a programmatic and individual perspective. When the effectiveness is found to be lacking, updates need to be made immediately.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Assets, Risks, and Threat Protection&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When goals are defined, it is time to take inventory. There are large numbers of EIT assets that need to be categorized and evaluated for potential risk. Often the EIT security arena is divided into facilities, computer hardware, telecommunications, networking, software, and information (data), better enabling the organization to identify each asset and evaluate the potential of the asset as a security risk. Individuals with security risk identification skills specific to each area need to be involved in the activity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When each asset is identified, the team needs to enumerate the risks associated with the asset. Some assets may only have a couple of risks or potential threats associated with them, while others may have hundreds of potential risks. For each risk, the team needs to evaluate the cost of a security breach for that asset in concert with the asset owner and stakeholders.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Facility Security Evaluation&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Facility security is part of most companies' plans and this has been the case for years. These plans are usually ''perimeter based''. Using this mindset, the organization can consider everything in a defined area as one large asset. You might think that a standard facilities security plan would be good enough, but an alarming number of cyberattacks occur inside the defined security perimeter of a standard physical security plan. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To counter these attacks, facility security plans need to be changed from being perimeter based to being ''area based''. All assets within an area, even the non-tangible information assets, need to be protected. Therefore, the physical security planning process needs to be fully integrated with those steps that protect the information assets themselves. The facility security plan needs to:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Clearly identify and define protected areas; define a layered defense.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Regulate access to protected spaces 24 x 7.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect against physical intrusion into any protected space.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect sensitive equipment as well as equipment that contains sensitive information, including portable devices.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Protect sensitive materials on desks, walls, and so on, ensuring that they are always located in a safe place.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Clearly define appropriate responses to any identified security breaches.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Asset identification processes and the security plan need to take into account not only threats associated with unauthorized entry of an individual, but also damage caused by man-made or natural disasters. All of these threats need to be identified and safeguards/techniques need to be identified to protect against them (see the [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness] chapter). &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Telecommunications &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Telecommunications networks and other pieces of infrastructure are rapidly being assimilated into the Internet. Today, systems such as electrical grids and traffic systems are now accessible to users, regardless of their location, with a few clicks of a mouse. These tremendous capabilities are not without consequences. For example, a hacker can launch attacks capable of denying voice service to cellular telecommunications networks in major cities, or use telecommunications for turning off utilities in the smart grid. In times of emergency, when such networks are essential in saving lives, such attacks can be extremely dangerous.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When evaluating assets, and looking for risks and mitigation techniques, the telecommunications team needs to consider the following security techniques:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Authorization'''—Requiring authorization to help prevent unauthorized interceptors from accessing telecommunications in an intelligible form while still delivering content to the intended recipient&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Cryptosecurity'''—Communications security that results from the use of cryptosystems to ensure message confidentiality and authenticity&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Emission security'''—The protection to deny unauthorized personnel information due to interception and analysis of emanations from cryptographic equipment, information systems, and telecommunication systems&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Transmission security'''—The security that protects transmission from interception and exploitation by means other than cryptanalysis, such as frequency hopping and spread spectrum&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Physical security'''—All physical measures necessary to safeguard classified equipment, material, and documents from access&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Network and Internet Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although similar to telecommunications security, network and Internet security present additional assets and risks. The open nature of the Internet puts all users at risk of attack. It also puts all servers, computers, and other devices that interact with the Internet at risk. As a result, carefully documenting all network settings, proxies, licenses, VPNs, and the assets on each LAN or network segment is critical. Each must be examined for vulnerability.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Understanding where all the assets are and how open they are to network traffic is difficult, but necessary to assess the true threat risk for the asset. The team needs to be able to understand the potential risks of denial of service or phishing from any given device on not only that device, but the rest of the assets on that part of the network.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In addition, it is important to understand the needs of users for network and Internet use. If users don't need to have access to the Internet, many issues become irrelevant. Some enterprises set up separate network access routes for employees to use so that access from a secure intranet is impossible.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Computers and Mobile Devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each computational device needs to be evaluated. Although we most often think of threats associated with software, hackers can attack the devices themselves either via theft, electronic intrusion, and physical damage. The security plan needs to protect hardware and other devices from all these kinds of threats. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To understand what threats apply, collect detailed information about each piece of hardware, such as: &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operating system version&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Internet browser version &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Asset usage and users of the asset &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Applications running on the asset&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Peripherals used &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This information helps determine what threats need to be considered.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Mobile Device Security&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Mobile devices have become so powerful and well integrated into business operations that they must be treated like any other information system. The data on them often is as sensitive as that on data servers and workstations. In addition, the mobility of the devices allows the device to access the Internet nearly anywhere, and also makes them both easy and desirable to steal. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The EIT security staff needs to understand what devices are being used, where they are going, and what applications and data they contain. Staff also need to have controls in place so that unauthorized mobile devices cannot access data stores. Understanding the risks allows the security team to determine what type of security software needs to be installed, and what measures need to be taken to protect sensitive information. Because of the ubiquitous nature of mobile devices, various [http://eitbokwiki.org/Glossary#mdm mobile device management (MDM)] suites have been created to centralize controls. MDM can provide risk mitigation (such as the remote wipe of a mobile device) or policy enforcement (such as device encryption) without requiring security staff to individually configure each device.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Application and App Development Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Application security includes those measures taken within the code to prevent security gaps whether due to flaws in the design, implementation, deployment, or maintenance processes associated with the application.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with all the other areas, it is important to take inventory of your software assets so that you know the potential threats due to the functionality of the systems. As organizations field software, the security of the software asset is not complete without consideration of the software itself, the host, connected devices, and the network.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Through the years, many techniques and development lifecycles (e.g., Microsoft SDL, OWAP CLASP, Cigital touchpoints) have been developed (see ''Improving Web Application Security''&amp;amp;nbsp;[[#Four|[4]]]) that include patterns and techniques to help identify the types of attacks to which an application is vulnerable. There are many categories of attacks on apps that have been identified, including:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Software tampering (changing, substituting, or extending code)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication attacks (credential theft, brute force attack, cookie replay)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authorization attacks (data tampering, elevation of privileges)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptographic attack (encryption breaking due to poor key management or weak encryption)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Session takeovers (session hijacking, session replay)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Sensitive information attacks (eavesdropping, data tampering, accessing sensitive data)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Lists of vulnerabilities can be found in a number of sources, including OWASP Tops 10&amp;amp;nbsp;[[#Eleven|[11]]], SANS Tops 25&amp;amp;nbsp;[[#Twelve|[12]]], and CVE&amp;amp;nbsp;[[#Thirteen|[13]]].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Mobile applications are even harder to protect than workstation-based applications. Weakness in mobile application security can come from many sources, but the largest endemic risk is from the mobile platform itself. A vulnerability in the mobile platform can impact the confidentiality, integrity, and availability of all applications on a device or a fleet of devices. In addition, mobile application stores provide a supply-chain risk. A user could potentially download an application for which the user does not have the correct level of access, putting their device at risk. &amp;amp;nbsp;[[#Nine|[9]]]&amp;amp;nbsp;[[#Ten|[10]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are several strategies that programmers can use that can enhance mobile app security, such as using stronger authentication and authorization, tying processes to user IDs, and ensuring transport-layer security. There are many sources available that discuss how to build security into applications.&amp;amp;nbsp;[[#Eight|[8]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Data Security&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Although related to all the other levels of assets, a security plan needs to consider some individual data items as assets themselves. It doesn't matter how the hacker gets into the database (hardware, software, network, or physical access), the fact that sensitive information, such as social security, telephone, and credit card numbers are accessed is extremely damaging to the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The data security team needs to understand which elements in the database are particularly sensitive or critical for operations. There are a whole host of means by which data systems can be compromised and each of these potential threats needs to be analyzed and mitigated.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Theft of storage element or media&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Loss of a storage element or media&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Loss of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Tampering of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Unauthorized privileged access of data&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Media configuration changes (intentional, malicious, or not)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Denial of service/access&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Traffic/communications monitoring&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Designing Controls&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are a host of known designs, techniques, tools, and consultants that can help design security controls. Many books are written about the topic. And, yet, this is a very difficult process. There needs to be balance between providing the best security against potential threats, while still providing the functionality required by the business requirements of the enterprise. Some risks can be tolerated if they are required to run the business; for example, the risks associated with running an online store. The cost of implementing a mitigation technique also needs to be carefully evaluated, because the cost of the solution could be higher than the potential cost of the risk. Often, a security policy or manual procedure is the most cost-effective solution available.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Knowing different security models and techniques can guide the security team in designing and selecting the best mitigation technique to use. We cover some of those design models and considerations here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Policy and Procedure Development &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Effective security policies that are followed throughout the enterprise are another essential component of the security program. These policies need to be carefully designed, well-communicated and monitored, and must cover a number of areas:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Access and overreaching policies'''—These policies regulate email, password setting, acceptable use of resources, encryption key usage, and even security response and disaster-recovery processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Computer and server security policies'''—This area of policies covers issues such as server security, workstation security, software installation, facilities security, information logging, database access and credentials, and technology disposal.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Network security policies'''—These policies cover just about any risk associated with the networks that can be regulated by a policy, such as remote access, router and switch security, and wireless communication. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Application security policies'''—These policies cover topics such as access and control, the delineation of responsibilities for access to files and data, web application security, mobile device app security, and security tools. These policies might also regulate the use of open-source software and third-party code, and require that such code be contained in a secure software repository. In some organizations, these policies require cryptoroutines and scans that test for vulnerabilities with in the code.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of security policies is a difficult one for most CIOs. A lot of help is available for forming security policies that protect the organization; however, getting a policy to be followed throughout the enterprise can be extremely difficult. Compliance with security policies can be distressingly low in certain areas, such as policies associated with mobile device use and personal browsing on corporate workstations. This trend makes training of and frequent communication to all employees an essential part of policy enforcement, as is motivating the average employee to follow the rules.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Architecture and Models &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A ''security model'' is a representation of the enterprise's rules or policies about security, especially data access. The models don't tell an organization specifically how to design their security system. Instead, models provide a perspective on how to look at security for a system. A particular architecture might use several security models. There are many different security models and we cover a few here.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''State machine model'''—To verify the security of a system, the state of the system is used. Therefore, all current permissions and accesses to information systems are captured. Systems that employ this model are in a secure state all the time.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bell-LaPadula model'''—This model was developed to address the leakage of classified information. It was the first rigorous model of a multilevel security policy used to define a ''secure state'' machine, and modes of access to information. In this model, users with different &amp;quot;clearances&amp;quot; have access to different levels of information.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Biba model'''—This model is similar to the Bell-LaPadula model. It addresses the integrity of data that is threatened when users at lower security levels are able to write to objects at higher security levels.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Clark-Wilson model'''—This model focuses on preventing authorized users from making unauthorized modifications to data, or committing fraud and errors within commercial applications. Rather than confidentiality, this model protects the integrity of the data.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Information flow model'''—This type of model looks for insecure information flow. Insecure information flow can occur at the same level or between different levels until a restricted operation is attempted. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Non-interference model'''—This model ensures that any actions that take place at a higher security level do not affect or interfere with actions at a lower level. This model doesn't care about the flow of information, but what the user knows about the state of the system, especially about actions taken at a higher level.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Brewer and Nash model'''—This model is designed to provide access controls that can change dynamically depending on the user's previous actions. It prevents access to data that might be considered a conflict of interest. This model is used often in financial institutions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Graham-Denning model'''—This model creates rights for users that are associated with operations that can be executed on objects. In essence, it defines the &amp;quot;rights&amp;quot; that a user has to perform actions.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Harrison-Ruzzo-Ullman model'''—This model specifies how access rights can be changed. It also specifies how objects can be created and deleted.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Classification for Levels of Access&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The area of access management is complex and can generate debates on specific details during the implementation of who can see what data and when. The ''how'' is often dictated by identity management systems already in place within the enterprise. However, these identity management systems often have the flexibility to design multiple discretionary frameworks, such as role-based and user-based security models. Access control policies need to take all forms of access control into consideration.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;One of the first functions of developing a security model is to determine the categories of users needed to ensure data is accessed on an as-needed basis. Role-based access control is a common method used for access control. Here are some of the most common roles:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Administrators'''—Administrators' capabilities can range from database administrators to file or storage administrators. However, software developers and network administrators may often have cross-domain responsibilities that require a high level of access. This level includes access to create, modify, and delete data, files, and configuration settings. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Power/super users'''—Power/super users is an optional level of security access that provides highly knowledgeable functional users with the authorization to access more service functions that their job function requires. This level adds mentoring or coaching to the duties of this role. Generally this type of user has access to all areas of a service if they are responsible for assisting or training others in that service. Another term for this type of user is ''functional lead''. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Primary functional users'''—Primary functional users have application and service authentication and access rights allowing them to perform the business functions needed to complete their daily tasks. These are end users that add and update records with the highest frequency of any user group. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secondary (casual) user types'''—Secondary or casual users are roles such as auditors and managers, or those given user IDs for one-time or temporary access, such as contractors or consultants. These roles usually have read-only access or may have access to very limited functions, such a reporting or expense submission.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Anonymous/read-only users'''—A final category is anonymous access to public information or read-only employee information, for users who need access to data, such as benefit or corporate reporting information. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Implementing and Maintaining Selected Security Controls&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;After the security controls are designed, they need to be put into operation. Implementing security controls is just like constructing and implementing any other EIT solution. The implementation has to be carefully planned and integrated into already existing hardware, software, processes, polices, and procedures. Luckily, it is usually the case that you can implement just one mitigation technique at a time, which means an organization can roll out a security plan in pieces, according to the priorities it has established. For example, one month an organization can implement new password policies and procedures. The next month, it upgrades all servers to a new version of the OS that contains new security features. And, one would expect that the security testing function is continuously improving over time.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each EIT department plays a role in integrating, monitoring, and maintaining the security plan.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''System administration'''—This department usually rolls out new versions of the operating systems and software, and ensures that the operational environments are configured in accordance with approved baselines and that all security updates are installed on devices in a timely manner.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Network services'''—It is their role to ensure that the network set up follows the security plan. Network services also need to monitor the network for any illegal traffic.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Customer service and technical support'''—This group's role is to help individuals follow the security policies and procedures. Often this includes teaching both in classroom base sessions as well as individual handholding.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Data administration and knowledge management'''—Data and knowledge administrators need to make sure that all data security controls are implemented on all databases and knowledge bases. In addition, they need to monitor databases constantly for any form of breach.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Systems security analysis'''—Systems security analysis is an ongoing concern. This group is in charge of detecting security breaches. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Security Monitoring, Accountability, and Testing &amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing security measures is an essential part of a security plan. You cannot verify that the plan is working unless you test whether the security measures (software, policies, and procedures) are working as the plan specifies. Unfortunately, even if the security system tests run without finding flaws, there is no guarantee that it is free of vulnerabilities. It is nearly impossible to test for all possible vulnerabilities; hackers seem to find new ones every day.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;To test a security system, you have to design the tests to cover the [http://eitbokwiki.org/Glossary#ciatriad CIA triad (confidentiality, integrity, availability)]. In addition, the tests specifically need to cover authentication, authorization, and non-repudiation. Tests must cover the different areas of vulnerabilities, such as network security, system software security, client-side application security, and server-side security. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Testing and then forgetting doesn't work in security. The plan should provide required frequencies for conducting different tests on the system and for reporting the results. The security team needs to monitor the system to make sure that security measures (such as network settings) have not been changed and that vulnerabilities have not appeared. This is an ongoing maintenance issue, not a one-time verification of a system.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Security Accountability&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A major component of every security system is accountability. In this arena, ''accountability'' is the ability to trace all the actions performed on a device, within a process, or by a user. Techniques such as unique user identification (UUID) and authentication strongly support accountability. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Accountability is necessary to ensure that any attempted or committed security violation can be traced to the device on which it occurred and to the individual that committed the breach. Accountability enables the EIT organization to find those individuals that need to be held responsible for the damage. Without accountability, security monitoring has little purpose.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Vulnerability Testing Categories and Levels&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with all testing, the three standard categories of testing also apply to security: white box, gray box, and black box. ''White box testing'' is done with full knowledge of the system being tested—you know what you are looking for. ''Gray box testing'' is done with partial knowledge of the system. ''Black box testing'' is done with no knowledge of the system being tested, and testing for penetration is primarily black box testing. There are a number of testing phases or levels that mature security tests have. Some of them are automated and some are done by hand. Here are some of the most common levels:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Discovery'''—This phase identifies information systems and determines the technologies that are in use. It also determines, hosts, ports, and application entry points. A discovery process might find deprecated versions of software or firmware that are prone to attack, or it might find newly opened ports or entry points.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Vulnerability scan'''—This scan identifies known security issues with automated tools that look for specific conditions or situations that are known to indicate vulnerabilities. These scans can be run with or without credentials (which helps determine what parts of the enterprise can be accessed without an authorized login). &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Vulnerability scans'''—These scans can be manual or automated, and typically test for secure transmissions protocols, authentication vulnerabilities, session management vulnerabilities such as cookie scope and session termination timeouts, authorization vulnerabilities, data or file input vulnerabilities, and error-handling defects, among others. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration tests'''—These tests simulate an attack by a malicious hacker. Typically, these tests are performed by individuals who use complicated methodologies and problem-solving skills to penetrate an organization's security measures. These tests go beyond what automated tools are capable of doing.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Security review'''—This review verifies that the enterprise's policies and procedures are in place and are being used systematically throughout the organization. In addition, the reviewers need to verify that any required industry and governmental standards are being applied to each information system component.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;When the series of tests is done, the team typically performs a series of risk assessments and audits. The team considers each finding and determines the seriousness of the vulnerability. The team might determine that in this context, an identified vulnerability is actually a false positive. At times, the team might even manually reproduce a vulnerability that was found with an automated system to verify the exposure. The resulting assessment report often lists the vulnerabilities by their seriousness and potential cost to the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;SecurityIncident&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;h2&amp;gt;Security Incident Response and Management&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Managing security incidents or events is just a special case of computer system or network management. The goal is to have a well-understood and predictable response to potentially damaging intrusions or events. There are a number of recommended incident management procedures that one can find with a simple search, but most are minor variations on a particular theme. In the discussion below, we have included the activities that are generally recommended and commonly included in an incident response plan.&amp;amp;nbsp;[[#Fifteen|[15]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[[File:DetectEvent.jpg|700px]]&amp;lt;br /&amp;gt;'''Figure 3. Incident Response Plan'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Detecting the Event&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Detecting a security breach is often harder than it seems. Most companies don't know that they have been breached. The ones that do often find out days, weeks, or even months after the attack—just read about Target and their experience. They found out about the attack about a month after it occurred, despite their high-end antihacking operation. Event detection is difficult for two reasons. First, detection has become a far more complex task due to the increased size of attack surface, as systems have gotten more highly integrated and complex. Second, many companies are not using state-of-the-art detection software and programs.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As a result, detection is very difficult and detection technology is usually lagging behind the level of the most advanced hackers. In addition, most enterprises use detection methods that are only partially effective, at best. They don't keep up with the state-of-the-art detection software. Also, most enterprises do not perform a thorough analysis of the potential avenues of attack. If you don't understand where the attacks can occur, you can't put monitors in to detect them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are two great examples of this. First, in the case of the attacks on Target, there were point-of-sale terminals that were not being monitored as a point of attack. Second, in gas station skimmer attacks, credit card numbers are stolen by inserting a hardware device into the gas pump. The device actually powers itself with the pump's own electricity. The designer of the pump never considered this point of entry for an attack.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Over the last several years, detection methods have gone from signature or rule based to being behavior and analytics based. Most of the damage is done after the initial breach of the perimeter security, such as the corporate firewalls. So, it is now critical for organizations to have technology that can detect breaches (foreign activity) that occur behind the firewall. And these breaches often last for hours. There is significant evidence that one of China's cyberespionage units attacked 141 victim companies and stole multiple terabytes of data in attacks that lasted at least a year! &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Assessing/Analyzing the Event&amp;lt;/h3&amp;gt; &lt;br /&gt;
&amp;lt;p&amp;gt;When the event has been detected, the security team needs to assess the event quickly to keep the damage from spreading. The team needs to determine whether the event is malicious or not and what type of event is it. It might be a denial of service, an access attack, or a reconnaissance attack, for example.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The team needs to determine as best as possible how the breach occurred. The attack could have come from outside the organization or from within. It could have been a piece of malware or an Internet worm running on one of the internal systems. They need to determine the particular system that was breached.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;A quick assessment of what has been affected needs to be made to determine what data, software, or hardware has been breached or damaged. The initial assessment also needs to determine the severity of the attack. It could be just a nuisance, or it could be a serious threat to the business, staff, vendors, or customers. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Containing the Damage&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;After a basic assessment has been made, you need to take steps to contain the damage. What systems need to be brought down? Do workstations need to be confiscated? Does the organization's connection to the Internet need to be broken? Can you just limit third-party activity? Do you need to shut down wireless networks? Do you need to change passwords throughout the enterprise as fast as possible?&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Collecting and Protecting Evidence&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If the event is malicious, especially if it causes significant damage, it is critical to save the evidence. Obviously, the team needs to identify the type and severity of the compromise, and where the attack came from. The team also needs to save critical data to be used for forensic purposes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The organization's team might not have the capability to collect and protect the evidence; however, there are a number of companies that specialize in helping organizations with this process.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It is important to note that collecting and protecting the evidence usually slows down the recovery process; however, for a significant security breach, there is no question that it is the right thing to do.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Communicating to Those Affected&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It is critically important to communicate to those individuals who are affected by the event. This might mean sending an email to an employee because there is malware on their workstation. It might mean sending out email or letters to thousands of customers, because their credit card data has been stolen. And in most cases, it is critical to notify management. Incident response plans should include a table that indicates who should be notified given the type and complexity of the security incident. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Notifying Appropriate Agencies&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;If the event is serious, the appropriate agencies need to be informed of the event. Contacting the organization's lawyer is likely the best first step. Determining the correct law enforcement agency to call is not always straightforward. In the USA, the FBI and Homeland Security are obvious choices for a foreign attack. For each country, the agencies are different, and it is important to determine which agencies the security team should call under particular conditions. All appropriate contact information needs to be part of the security plan. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Many organizations now have insurance coverage for cyberattacks. The corporate lawyer should know about that coverage. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Recovering Systems and Installing Permanent Fixes&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;At some point, when the emergency is over and the incident is reported, it is time to figure out how to get all the enterprise's systems back in running order, as described in the [http://eitbokwiki.org/Disaster_Preparedness Disaster Preparedness chapter]. This might require changing software or hardware. It might require running malware-removal software throughout the organization. It might also require having everyone change passwords throughout the enterprise.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Part of this system-recovery process should also involve putting in a permanent fix for the breach that was identified. This could mean installing patches to existing software or hardware, installing new intrusion-detection software, changing VPN protocols and procedures, or changing how sensitive data is stored. Often companies increase the level of encryption of the sensitive data. In any case, this is a time to plug the hole that was breached, and possibly plug a few others at the same time.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Compiling Incident Documentation with Damage Assessment&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;As with most catastrophic events, it is important to document the event thoroughly, so that you can treat it as a lesson learned. Every step of the event, the analysis, and the fixes should be documented and kept with the security plan. Along with that, the damage caused and the cost of repairing the damage should be calculated and documented.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;According to the New York Times&amp;amp;nbsp;[[#Seven|[7]]], the attack on Target cost the company a reported $148 million in direct costs, and cost financial institutions $200 million. In addition, Target's move to the chip-and-pin system, which is a more secure method for dealing with credit card data cost Target an additional $100 million, although the move to chip-and-pin was not a direct result of the breach. The company also spent $61 million in antibreach technology shortly following the attack. Even beyond those direct costs, profits fell 46 percent in the quarter following the announcement of the attack.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Review Incidents, and Updating Policies and Procedures&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Simply identifying the things that could have been done better with respect to the incident is not enough. It is critical for the enterprise to review current policies and procedures, and make changes that decrease security risks. These changes can be as simple as how often employees are required to change their passwords. It could be changes in VPN access rules, or it could be inserting a file encryption mechanism into many data transfer processes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Summary&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;EIT security is a major area of concern for CIOs. The area is changing on a daily basis. The attacks are becoming more frequent and more sophisticated. Often the security breaches are from within, whether intentional or not.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There is no way that a large enterprise can protect against all threats. Instead, an organization has to use its security resources in the most efficient way possible. To do that, the organization needs to inventory its computing assets, assess the risks and the related costs/damages of a security breach, and then make hard decisions about which risks to focus on and which to handle with less-rigorous methods, such as policies and procedures.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It has become more and more important for organizations to understand their risk appetites, and truly weigh the potential security risks with providing new services and functionality to customers, vendors, and employees.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt; Key Maturity Frameworks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Capability maturity for EIT refers to its ability to reliably perform. Maturity is measured by an organization's readiness and capability expressed through its people, processes, data, and technologies and the consistent measurement practices that are in place. See [http://eitbokwiki.org/Enterprise_IT_Maturity_Assessments Appendix F] for additional information about maturity frameworks.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Many specialized frameworks have been developed since the original Capability Maturity Model (CMM) that was developed by the Software Engineering Institute in the late 1980s. This section describes how some of those apply to the activities described in this chapter. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IT-Capability Maturity Framework (IT-CMF) &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The IT-CMF was developed by the Innovation Value Institute in Ireland. This framework helps organizations to measure, develop, and monitor their EIT capability maturity progression. It consists of 35 EIT management capabilities that are organized into four macro capabilities: &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing EIT like a business&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing the EIT budget&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing the EIT capability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing EIT for business value&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Each has five different levels of maturity starting from ''initial'' to ''optimizing''. The three most relevant critical capabilities are information security management (ISM), risk management (RM), and personal data protection (PDP). &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Information Security Management Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the information security management (ISM) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The approach to information security tends to be localized. Incidents are typically not responded to in a timely manner. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Defined security approaches, policies, and controls are emerging, primarily focused on complying with regulations. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Standardized security approaches, policies, and controls are in place across the EIT function, dealing with access rights, business continuity, budgets, toolsets, incident response management, audits, non-compliance, and so on. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Comprehensive security approaches, policies, and controls are in place and are fully integrated across the organization. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Security approaches, policies, and controls are regularly reviewed to maintain a proactive approach to preventing security breaches. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Risk Management Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the risk management (RM) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are considered in an ad hoc manner, if at all. No risk-related roles are defined, or they are defined in an ad hoc manner. Risks are not actively or systematically managed. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program sits within the EIT function, and a basic framework is established. Responsibility and accountability for risk management are assigned to persons/roles in the EIT function. Some basic risk management approaches are established but these may not be consistently adhered to.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and supporting framework are established and consistently referenced in the EIT function and some other business units. Responsibility and accountability for risk management are assigned to dedicated persons/roles in the EIT function and other business units. Most risk management activities adhere to defined and documented approaches.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are established through the cooperation of, and in consultation with, the EIT function and the rest of the business. The risk management of EIT is integrated into wider ERM practices. Explicit risk management responsibility and accountability are assigned to employees across the organization. Compliance with the approaches, principles, and guidance for all risk management activities is mandated and enforced organization-wide.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The risk management program and framework are continually refined and updated, and involve regular cooperation with business ecosystem partners. Responsibility and accountability for risk management are dynamically assigned to the appropriate organization level, and regularly reviewed. Risk management approaches, principles, and guidance are continually reviewed and improved based on changes in the risk landscape, and learning from previous risk incidents. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Personal Data Protection Maturity&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The following statements provide a high-level overview of the personal data protection (PDP) capability at successive levels of maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt; &lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;10%&amp;quot;&amp;gt;Level 1&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;There is limited to no understanding of personal data protection obligations, and enforcement is ad hoc.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 2&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The EIT function has started rolling out personal data protection policies and procedures to meet high-priority legislative, regulatory, EIT and business needs. The risks associated with holding personal data have begun to reduce. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The management of personal data protection follows standardized policies and procedures across the EIT function and some other business units for most priority legislative, regulatory, EIT and business needs. The organization's reputation for managing personal data is growing. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The management of personal data protection follows comprehensive policies and procedures across the entire organization for all necessary legislative, regulatory, EIT, and business needs. The organization has a good reputation for managing personal data. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;Level 5&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;There is a culture of proactive personal data protection across key business ecosystem partners. This is continually reviewed to ensure that the likelihood of personal data privacy violation remains low. &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Key Competence Frameworks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;While many large companies have defined their own sets of skills for purposes of talent management (to recruit, retain, and further develop the highest quality staff members that they can find, afford and hire), the advancement of EIT professionalism will require common definitions of EIT skills that can be used not just across enterprises, but also across countries. We have selected three major sources of skill definitions. While none of them is used universally, they provide a good cross-section of options. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100 percent correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings. Please take that in consideration as you review them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;Skills Framework for the Information Age&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The Skills Framework for the Information Age (SFIA) has defined nearly 100 skills. SFIA describes seven levels of competency that can be applied to each skill. However, not all skills cover all seven levels. Some reach only partially up the seven-step ladder. Others are based on mastering foundational skills, and start at the fourth or fifth level of competency. SFIA is used in nearly 200 countries, from Britain to South Africa, South America, to the Pacific Rim, to the United States. (http://www.sfia-online.org)&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;SFIA skills have not yet been defined for this chapter.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Description&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;10%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Competency Levels&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information assurance&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The protection of integrity, availability, authenticity, non-repudiation, and confidentiality of information and data in storage and in transit. The management of risk in a pragmatic and cost-effective manner to ensure stakeholder confidence.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;5-7&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information security&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The selection, design, justification, implementation, and operation of controls and management strategies to maintain the security, confidentiality, integrity, availability, accountability, and relevant compliance of information systems with legislation, regulation, and relevant standards.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;3-7&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Penetration testing&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The assessment of organizational vulnerabilities through the design and execution of penetration tests that demonstrate how an adversary can either subvert the organization's security goals (e.g., the protection of specific intellectual property) or achieve specific adversarial objectives (e.g., establishment of a covert command and control infrastructure). Pen test results provide deeper insight into the business risks of various vulnerabilities.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;4-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Digital forensics&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The collection, processing, preserving, analyzing, and presenting of computer-related evidence in support of security vulnerability mitigation and criminal, fraud, counterintelligence, or law enforcement investigations.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;4-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Security administration&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The provision of operational security management and administrative services. This typically includes the authorization and monitoring of access to EIT facilities or infrastructure, the investigation of unauthorized access, and compliance with relevant legislation.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;1-6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;European Competency Framework&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The European Union's European e-Competence Framework (e-CF) has 40 competences and is used by a large number of companies, qualification providers, and others in public and private sectors across the EU. It uses five levels of competence proficiency (e-1 to e-5). No competence is subject to all five levels.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The e-CF is published and legally owned by CEN, the European Committee for Standardization, and its National Member Bodies (www.cen.eu). Its creation and maintenance has been co-financed and politically supported by the European Commission, in particular, DG (Directorate General) Enterprise and Industry, with contributions from the EU ICT multi-stakeholder community, to support competitiveness, innovation, and job creation in European industry. The Commission works on a number of initiatives to boost ICT skills in the workforce. Version 1.0 to 3.0 were published as CEN Workshop Agreements (CWA). The e-CF 3.0 CWA 16234-1 was published as an official European Norm (EN), EN 16234-1. For complete information, see http://www.ecompetences.eu. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;85%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;e-CF Dimension 2&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;e-CF Dimension 3&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;D.1. Information Security Strategy Development (ENABLE)&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;Defines and makes applicable a formal organizational strategy, scope, and culture to maintain the safety and security of information from external and internal threats, i.e., digital forensic for corporate investigations or intrusion investigation. Provides the foundation for information security management, including role identification and accountability. Uses defined standards to create objectives for information integrity, availability, and data privacy.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Level 4-5&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;E.8. Information Security Management (MANAGE)&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;Implements information security policy. Monitors and takes action against intrusion, fraud, and security breaches or leaks. Ensures that security risks are analyzed and managed with respect to enterprise data and information. Reviews security incidents, and makes recommendations for security policy and strategy to ensure continuous improvement of security provision.&amp;lt;/td&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Level 2-4&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;i&amp;amp;nbsp;Competency Dictionary &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The Information Technology Promotion Agency (IPA) of Japan has developed the i&amp;amp;nbsp;Competency Dictionary (iCD) and translated it into English, and describes it at https://www.ipa.go.jp/english/humandev/icd.html. The iCD is an extensive skills and tasks database, used in Japan and southeast Asian countries. It establishes a taxonomy of tasks and the skills required to perform the tasks. The IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The iCD consists of a Task Dictionary and a Skill Dictionary. Skills for a specific task are identified via a &amp;quot;Task x Skill&amp;quot; table. (See [http://eitbokwiki.org/Glossary Appendix A] for the task layer and skill layer structures.) EITBOK activities in each chapter require several tasks in the Task Dictionary. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The table below shows a sample task from iCD Task Dictionary Layer 2 (with Layer 1 in parentheses) that corresponds to activities in this chapter. It also shows the Layer 2 (Skill Classification), Layer 3 (Skill Item), and Layer 4 (knowledge item from the IPA Body of Knowledge) prerequisite skills associated with the sample task, as identified by the Task x Skill Table of the iCD Skill Dictionary. The complete iCD Task Dictionary (Layer 1-4) and Skill Dictionary (Layer 1-4) can be obtained by returning the request form provided at http://www.ipa.go.jp/english/humandev/icd.html. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Task Dictionary&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th colspan=&amp;quot;3&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot; font-size=&amp;quot;14pt&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Dictionary&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;30%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Task Layer 1 (Task Layer 2)&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Classification&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Skill Item&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;th width=&amp;quot;40%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;Associated Knowledge Items&amp;lt;/font&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;em&amp;gt;&amp;lt;strong&amp;gt;Information security operation management &amp;lt;br /&amp;gt;(EIT operation control)&amp;lt;/strong&amp;gt;&amp;lt;/em&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Basic security technology&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information security&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt; &amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of PKI technology trends&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Access control (authentication, log monitoring, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Rules on installing applications (rules on the installation and use of applications on machines connected to the network)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Application security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Installation and administrative rules for public Internet servers (rules on installation standards and operational management of servers to be connected to the Internet)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Rules on Internet use (rules on the use of email and Internet access from the company)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operational rules for measures against computer viruses (rules relating to measures against computer viruses for machines that exchange data externally)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Standards for measures against computer viruses&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Standards for measures against unauthorized access to computers&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of single sign-on technology trends&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of technology trends in security administration&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security tools (free, commercial)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security test items&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data protection (encryption, transmission, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Network protection (firewalls, intrusion detection, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of firewall technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Malware (viruses, spyware, worms, adware)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Encryption (DES)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Encryption (RSA)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptography (common key, public key, private key, RSA, AES, hybrid encryption, hash functions, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Threat&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Public key infrastructure (PKI, certificate authorities, digital certificates, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Attack methods (SQL injection, cross site scripting, DoS attack, phishing, targeted attacks, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Confidentiality, integrity, and availability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of technology trends in intrusion prevention&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Government public key infrastructure (GPKI, bridge certification authority, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Biometric authentication technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Vulnerability&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright protection (CPRM)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright protection (CSS)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Understanding and utilization of electronic signature technology&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Authentication technology (digital signatures, message authentication, time stamps, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;User authentication (ID, password, etc.)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Key Roles&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;These roles are common to ITSM.&amp;lt;/p&amp;gt; &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Compliance Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Enterprise Architect&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Information Security Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Risk Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Service Design Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Analyst&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Other key roles include:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Chief Information Security Officer&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data architect &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data owner&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Operations Manager&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Standards&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27013, Information technology—Security techniques—Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000–1&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27000:2016, Information technology—Security techniques—Information security management systems—Overview and vocabulary (this is the general overview to the ISO/IEC 27000 series of over 30 standards on information security management systems, and terms and definitions commonly used in the ISMS family of standards).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001:2013, Information technology—Security techniques—Information security management systems—Requirements&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27002:2013, Information technology—Security techniques—Information security management systems—Code of practice for information security controls&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 15408:2009, information technology—The common criteria for Information Technology Security Evaluation as an international standard for computer security certification. Establishes the general concepts and principles of EIT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408, which is its entirety is meant to be used as the basis for evaluation of security properties of EIT products.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC/IEEE 15026, System and software engineering—Systems and software assurance (4 parts)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Federal Information Processing Standards (FIPS) 140 series—These publications are computer security standards created by the US government specifically concerning cryptographic modules. FIPS 140-2 defines four levels of security and sets requirements in 11 different cryptographic areas including roles, services and authentication, physical security, design assurance, and cryptographic module ports and interfaces.&amp;amp;nbsp;[[#Fourteen|[14]]]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;References&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;One&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[1] ISO/IEC 27000:2014 definition of &amp;quot;information security.&amp;quot;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Two&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[2] ISO/IEC 27001:2013, Information technology—Security techniques—Information security management systems—Requirements.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Three&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[3] ISO/IEC 27002:2013, Information technology—Security techniques—Information security management systems—Code of practice for information security controls.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Four&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[4] J.D. Meier, A. Mackman, S. Vasireddy, et al. ''Improving Web Application Security: Threats and Countermeasures'', http://www.cgisecurity.com/lib/Threats_Countermeasures.pdf, June 2003.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Five&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[5] IAPP Information Privacy Certification Glossary of Common Privacy Terminology https://iapp.org/media/pdf/certification/CIPP_Glossary_0211updated.pdf, 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Six&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[6] Information Technology—Security techniques—Privacy framework, ISO/IEC 29100:2011; http://a-infosec.com/2014/01/25/public-available-of-isoiec-291002011-privacy-framework/&lt;br /&gt;
&amp;lt;div id=&amp;quot;Seven&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[7] Rachel Abrahms, ''Target Puts Data Breach Costs at $148 Million, and Forecasts Profit Drop'', New York Times, http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0, August 2014.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Eight&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[8] ''What is Build Security In?'' https://buildsecurityin.us-cert.gov/&lt;br /&gt;
&amp;lt;div id=&amp;quot;Nine&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[9] Dimensional Research, ''The Impact of Mobile Devices on Information Security: A Survey of IT Professionals'', https://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf, June 2013.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Ten&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[10] Phil Brit, ''10 Trickiest Mobil Security Threats'', eSecurity Planet, April 2015.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Eleven&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[11] OWASP, Top 10 2013, https://www.owasp.org/index.php/Top_10_2013-Top_10&lt;br /&gt;
&amp;lt;div id=&amp;quot;Twelve&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[12] CWE/SANS, ''CWE/SANS Top 25 Most Dangerous Software Errors'', https://www.sans.org/top25-software-errors/, June 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Thirteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[13] ITU-T, ''Common vulnerabilities and exposures'', http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=11061, April 2011.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fourteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[14] NIST Federal Information Processing Standards (FIPS) Publications, Feb 2013; http://csrc.nist.gov/publications/PubsFIPS.html.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fifteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[15] M. West-Brown, D. Stikvoort, KP Kossakowski, et. al., ''Handbook for Computer Security Incident Response Teams (CSIRTs)'', MU/SEI-2003-HB-002, Carnegie Mellon University, http://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf, April 2003.&lt;br /&gt;
&amp;lt;div id=&amp;quot;Sixteen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;[16] CSO Staff, ''The security laws, regulations, and guidelines directory'', December 2012, http://www.csoonline.com/article/2126072/compliance/the-security-laws—regulations-and-guidelines-directory.html.&lt;br /&gt;
&amp;lt;h2&amp;gt;Related and Informing Disciplines&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Physical and facilities security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Personnel security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transportation security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Retail security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Manufacturing security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Insurance and financial services security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Healthcare security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Utilities security&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cryptography&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code analysis tools&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Logging and tracing&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Biometric authentication&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Copyright and intellectual property protection&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Additional Reading&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;DHS: &amp;quot;IT Security Essential BoK, A Competency and Functional framework for IT Security Workforce Development,&amp;quot; http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2007-12/ISPAB_Dec7-BOldfield.pdf&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;NIST, Special Publication 800-37 (Revision 1), &amp;quot;Guide for Applying the Risk Management Framework to Federal Information Systems,&amp;quot; February 2010.&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=EITBOK:General_disclaimer&amp;diff=1785</id>
		<title>EITBOK:General disclaimer</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=EITBOK:General_disclaimer&amp;diff=1785"/>
				<updated>2017-11-15T01:09:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Created page with &amp;quot;Reference to any specific commercial products, process, or service does not imply endorsement by IEEE. The views and opinions expressed in this work do not necessarily reflect...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reference to any specific commercial products, process, or service does not imply endorsement by IEEE. The views and opinions expressed in this work do not necessarily reflect those of IEEE.&lt;br /&gt;
&lt;br /&gt;
IEEE makes this document available on an “as is” basis and makes no warranty, express or implied, as to the accuracy, capability, efficiency merchantability, or functioning of this document. In no event will IEEE be liable for any general, consequential, indirect, incidental, exemplary, or special damages, even if IEEE has been advised of the possibility of such damages.&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=EITBOK:About&amp;diff=1784</id>
		<title>EITBOK:About</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=EITBOK:About&amp;diff=1784"/>
				<updated>2017-11-15T01:08:44Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Created page with &amp;quot;This Guide to the Enterprise Information Technology Body of Knowledge (EITBOK) was first conceived in 2010 by the Professional Activities Board of the IEEE Computer Society (h...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This Guide to the Enterprise Information Technology Body of Knowledge (EITBOK) was first conceived in 2010 by the Professional Activities Board of the IEEE Computer Society (http://www.computer.org/web/peb/). They felt that the ever-increasing numbers of practitioners in EIT organizations, and the increasing complexity of their work, coupled with the criticality of EIT in today’s world, merited the development of materials to help them advance their profession.&lt;br /&gt;
&lt;br /&gt;
The real work on the EITBOK began in 2013 with the selection of the core team. It was determined from the first that this guide would be a resource “by practitioners, for practitioners.” The core team included people from Canada and the United States in North America, and from Latin America. We were also able to enlist collaboration from the European Union and Japan, with the ultimate goal of bringing together professionals across the globe to agree on the fundamentals of EIT, just as the IEEE creates EIT standards via international collaboration.&lt;br /&gt;
&lt;br /&gt;
In addition, a goal of the EITBOK team is to recognize the many other BOKs in specialized EIT areas that contribute to the profession. Hence, there are references throughout the EITBOK to those other BOKs that serve specialized areas of practice, like requirements engineering, enterprise architecture, systems engineering, and so on.&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Mujuni_jeremy&amp;diff=1783</id>
		<title>User talk:Mujuni jeremy</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Mujuni_jeremy&amp;diff=1783"/>
				<updated>2017-10-18T00:50:51Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 00:50, 18 October 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Sconte&amp;diff=1782</id>
		<title>User talk:Sconte</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Sconte&amp;diff=1782"/>
				<updated>2017-10-18T00:50:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 00:50, 18 October 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:SiGriff&amp;diff=1781</id>
		<title>User talk:SiGriff</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:SiGriff&amp;diff=1781"/>
				<updated>2017-09-21T17:00:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 17:00, 21 September 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:EForce&amp;diff=1780</id>
		<title>User talk:EForce</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:EForce&amp;diff=1780"/>
				<updated>2017-07-20T06:03:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 06:03, 20 July 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Hninahanco&amp;diff=1779</id>
		<title>User talk:Hninahanco</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Hninahanco&amp;diff=1779"/>
				<updated>2017-06-27T22:05:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 22:05, 27 June 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Zelimir&amp;diff=1777</id>
		<title>User talk:Zelimir</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Zelimir&amp;diff=1777"/>
				<updated>2017-05-27T20:49:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:49, 27 May 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Zetchv&amp;diff=1776</id>
		<title>User talk:Zetchv</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Zetchv&amp;diff=1776"/>
				<updated>2017-05-27T20:48:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:48, 27 May 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Cfob&amp;diff=1775</id>
		<title>User talk:Cfob</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Cfob&amp;diff=1775"/>
				<updated>2017-04-14T20:45:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:45, 14 April 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=User_talk:Itrejosz&amp;diff=1774</id>
		<title>User talk:Itrejosz</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=User_talk:Itrejosz&amp;diff=1774"/>
				<updated>2017-04-14T20:41:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''EITBOK''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:Jclayton|Jclayton]] ([[User talk:Jclayton|talk]]) 20:41, 14 April 2017 (UTC)&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Enterprise_IT_Maturity_Assessments&amp;diff=1771</id>
		<title>Enterprise IT Maturity Assessments</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Enterprise_IT_Maturity_Assessments&amp;diff=1771"/>
				<updated>2017-03-19T21:27:18Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
    &amp;lt;table&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki.  Like all wikis, it is a work in progress and may contain errors.  We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;What Is a Maturity Assessment&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Capability maturity for EIT refers to IT's ability to reliably perform. Maturity is measured by an organization’s readiness and capability expressed through its people, processes, data and technologies and the consistent measurement practices that are in place. The organization’s maturity directly relates to the ability to execute the IT strategy; therefore, there is a need to assess maturity as an input to a realistic plan and as a guide to maturing IT to desired levels.  In other words, unless the IT organization &amp;quot;knows itself,&amp;quot; it can’t make plans to do more or to improve. Adoption of “lessons learned” is a key improvement strategy. Mature EIT organizations collect “lessons learned” during each project as it is executing and build the results into organizational improvements on a regular basis. When reviewed and areas prioritized by management, a maturity assessment is an input to the EIT strategy formulation, since its results may highlight its performance constraints.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Maturity assessment involves scoring the organization against defined criteria and a ranking scheme. This assessment is generally organized in ascending steps with strategies on how to move up the maturity scale. Scales are often defined in a 1–5 range that indicates increasing levels of maturity. Some schemes allow for scoring that includes decimal points (such as 2.5). A common scheme defines the five levels in the following way:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Performed:''' Activities are performed in an ad hoc manner.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Managed:''' Activities are performed with managed processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Defined:''' Activities are defined so the organization can perform them in a uniform manner.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Measured:''' Oversight is given to the performed activities to ensure performance and uniformity.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Optimized:''' Continuous improvement processes are in place on the defined and measured processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A typical description of organizational maturity was developed by Stanford’s SLAC National Accelerator Laboratory, as shown in the table below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;10%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;18%&amp;quot;&amp;gt;Level 1&amp;lt;br /&amp;gt;&lt;br /&gt;
Performed&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;18%&amp;quot;&amp;gt;Level 2&amp;lt;br /&amp;gt;&lt;br /&gt;
Managed&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;18%&amp;quot;&amp;gt;Level 3&amp;lt;br /&amp;gt;&lt;br /&gt;
Established&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;18%&amp;quot;&amp;gt;Level 4&amp;lt;br /&amp;gt;&lt;br /&gt;
Predictable&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;18%&amp;quot;&amp;gt;Level 5&amp;lt;br /&amp;gt;&lt;br /&gt;
Optimizing&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;People&amp;lt;/strong&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Success depends on individual heroics.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;“Fire fighting&amp;quot; is a way of life.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Relationships between disciplines are uncoordinated, perhaps even adversarial.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Success depends on individuals and management system supports.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Commitments are understood and managed.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;People are trained.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Project groups work together, perhaps as an integrated product team.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training is planned and provided according to roles.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;A strong sense of teamwork exists within each project.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;A strong sense of teamwork exists across the organization.&lt;br /&gt;
Everyone is involved in process improvement.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Process&amp;lt;/strong&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Few stable processes exist or are used.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Documented and stable estimating, planning, and commitment processes are at the project level.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Integrated management and engineering processes are used across the organization.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Processes are quantitatively understood and stabilized.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Processes are continuously and systematically improved.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Technology&amp;lt;/strong&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;The introduction of new technology is risky.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Technology supports established, stable activities.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;New technologies are evaluated on a qualitative basis.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;New technologies are evaluated on a quantitative basis.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;New technologies are proactively pursued and deployed.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Measurement&amp;lt;/strong&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Data collection and analysis are ad hoc.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Planning and management data is used by individual projects.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Data is collected and used in all defined processes.&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Data is systematically shared across projects.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Data definition and collection are standardized across the organization&amp;lt;/li&amp;gt;&lt;br /&gt;
      &amp;lt;li&amp;gt;Data is used to understand the process qualitatively and stabilize it.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Data is used to evaluate and select process improvements.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Periodic reassessments are performed to gauge progress against the baseline assessment and prior periods. Adjustments to the efforts to maintain and improve maturity can then be made against possible strategic priority changes, governance initiatives, and roadmap resets. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Maturity assessments on internationally recognized frameworks generally involve external auditors with certification and recertification requirements. Engagement in the maturity assessment and improvement process requires a minimum level of organization self-awareness to the issues and commitment to the improvements necessary. A cultural readiness, resistance, and capability assessment may be built into a maturity assessment. The set of standards centered round ISO/IEC 33001 attempt to provide an overall general structure for process assessment related to software development.  &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Capability Maturity Model Integration (CMMI)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;[http://eitbokwiki.org/Glossary#cmmi Capability Maturity Model Integration (CMMI)]&amp;amp;nbsp;[[#F_One|[1]]] is a standard reference model for process improvement with cross-sector applicability with special focuses:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Product and service development &amp;amp;mdash; [http://eitbokwiki.org/Glossary#cmmi_dev CMMI for Development (CMMI-DEV)]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Service establishment, management, &amp;amp;mdash; [http://eitbokwiki.org/Glossary#cmmi_svc CMMI for Services (CMMI-SVC)]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Product and service [http://eitbokwiki.org/Glossary#acquisition acquisition] &amp;amp;mdash; [http://eitbokwiki.org/Glossary#cmmi_acq CMMI for Acquisition (CMMI-ACQ)]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Data management &amp;amp;mdash; [http://eitbokwiki.org/Glossary#cmmi_dmm CMMI for Data (CMMI-DMM)]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt; People Capability Maturity Model &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt; In addition, the CMMI Institute provides the &amp;lt;i&amp;gt; People CMM&amp;lt;/i&amp;gt; (https://www.sei.cmu.edu/reports/09tr003.pdf) which describes five levels of maturity for workforce management. It progresses from inconsistent management, to people management, to competency management, to capability management and ends with continually improving management practices. It is designed for continuously improving individual competencies, developing effective teams, motivating improved performance, and shaping the people capabilities the organization needs to accomplish its future plans. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; IT-Capability Maturity Model (IT-CMF)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Getting better at EIT strategy and governance requires both organizational change in how IT is managed and the development of individuals. The IT-Capability Maturity Model (IT-CMF) takes an organizational management approach to improving IT capability rather than a one focused on processes and thus is very complimentary to CMMI. IT-CMF (https://ivi.ie/) helps organizations to measure, develop, and monitor their IT capability maturity progression for maximum benefit in their particular context. It consists of 35 IT management capabilities and these are organized into four macro capabilities: managing IT like a business; managing the IT budget; managing the IT capability; managing IT for business value. Its 35 Critical Capabilities (CCs) are defined in as “A defined IT management domain that helps mobilize and deploy IT-based resources to effect a desired end, often in combination with other resources and capabilities” [2].  Each has five different levels of maturity starting from &amp;quot;initial&amp;quot; and going up to ‘optimizing’. The IT-CMF includes questionnaires to assess current maturity and a suite of practice recommendations to improve maturity.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;References&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;F_One&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[1] Capability Maturity Model Integration (CMMI) Version 1.2 Overview, http://www.sei.cmu.edu/library/assets/cmmi-overview071.pdf, Software Engineering Institute, Carnegie Mellon University, 2007. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;F_Two&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[2] IT Capability Maturity Framework (IT-CMF): The Body of Knowledge Guide. 2015. Eds. Martin Curley, Jim Kenneally, Marian Carcary. Van Haren Publishing&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Common_EIT_Roles&amp;diff=1770</id>
		<title>Common EIT Roles</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Common_EIT_Roles&amp;diff=1770"/>
				<updated>2017-03-19T21:27:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
    &amp;lt;table&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki.  Like all wikis, it is a work in progress and may contain errors.  We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;em&amp;gt;Intro to this section.&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What does it represent?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Where did the information come from?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/em&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table valign=&amp;quot;top&amp;quot; border=&amp;quot;1&amp;quot;  cellpadding=&amp;quot;2&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;20%&amp;quot;&amp;gt;Role Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;80%&amp;quot;&amp;gt;Role Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Access Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Access Manager executes policies defined in Information Security Management and grants authorized users the right to use a service, while preventing access to non-authorized users.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Application Analyst&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Applications manages applications throughout their lifecycle. This role plays an important part in the application-related aspects of designing, testing, operating and improving IT services. It is also responsible for developing the skills required to operate the applications required to deliver IT services.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Application Developer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Application Developer is responsible for making available applications and systems which provide the required functionality for IT services. This includes the development and maintenance of custom applications as well as the customization of products from software vendors.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Application Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An application owner is the individual or group with the responsibility to ensure that the program or programs, which make up the application, accomplish the specified objective or set of user requirements established for that application, including appropriate security safeguards. See http://itlaw.wikia.com/wiki/Application_owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An EIT Architect is responsible for design of a computing system and the logical and physical interrelationships between its components. The architecture specifies the hardware, software, access methods, and protocols used throughout the system. Bigger organizations may opt to introduce specialist architect roles such as Business Architect, Application Architect, Information Architect, and Infrastructure Architect.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Architecture Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Architect.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Availability Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Availability Manager is responsible for defining, analyzing, planning, measuring, and improving all aspects of the availability of IT services and for ensuring that all IT infrastructure, processes, tools, roles, and related items are appropriate for the agreed service-level targets for availability.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Backup Process Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Backup Process Manager is responsible for defining and assuring the viability of the enterprise's backup processes. Backup and recovery are essential to assuring service continuity. The recovery procedures are defined first, and then backup procedures and their frequency are based on the needs of the recovery procedures.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Analyst/SME&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Business Analysts work as liaison among stakeholders in order to understand the structure, policies, and operations of an organization, and to recommend solutions that enable the organization to achieve its goals&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A business architect is concerned with developing and maintaining business capabilities of the enterprise in line with the corporate strategy as well as contributing to the business strategy and plans.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Architecture Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Business Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Continuity Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Person who identifies potential threats to an organization and the impacts to business operations those threats, if realized, might cause, and which provides a framework for building organizational resilience.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Executive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Business Executive is a person appointed and given the responsibility to manage the affairs of an organization and the authority to make decisions within specified boundaries.&lt;br /&gt;
http://www.businessdictionary.com/definition/executive.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Business Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1. Person authorized to grant access to service/application &amp;lt;br /&amp;gt;2. A user representative authorized to negotiate with EIT on behalf of the business area.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Business Product Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Partner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A business partner is a commercial entity with which another commercial entity has some form of alliance. Businesses that cooperate, to any degree, such as a computer manufacturer who works exclusively with another company who supplies them with parts. To read more see: http://www.businessdictionary.com/definition/business-partner.html&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Product Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This role is not clearly differentiated from that of the Product Owner (in agile terms) or the Product Manager (in commercial software companies). “The Product Owner (PO) is the member of the team responsible for defining Stories and prioritizing the Team Backlog so as to streamline the execution of program priorities, while maintaining conceptual and technical integrity of the Features or components the team is responsible for.” scaledagileframework.com/product-owner/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Relationship Mgr/Mgt Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Business Relationship Manager is responsible for maintaining a positive relationship with customers, identifying customer needs and ensuring that the service provider is able to meet these needs with an appropriate catalogue of services. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Subject Matter Expert&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Subject Matter Expert&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Business Unit&amp;lt;br /&amp;gt;Business Unit Lead&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A logical element or segment of a company (such as accounting, production, marketing) representing a specific business function, and a definite place on the organizational chart, under the domain of a manager. Also called department, division, or a functional area.&lt;br /&gt;
www.businessdictionary.com/definition/business-unit.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Capacity Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Capacity Manager is responsible for ensuring that services and infrastructure are able to deliver the agreed capacity and performance targets in a cost effective and timely manner, considers all resources required to deliver the service, and plans for short, medium and long term business requirements.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Change Advisory Board (CAB)/&amp;lt;br /&amp;gt;Change Control Board (CCB)/&amp;lt;br /&amp;gt;Change Board&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A group of people that advises the Change Manager in the assessment, prioritization and scheduling of changes. This board is usually made up of representatives from all areas within the IT organization, the business, and third parties such as suppliers.&lt;br /&gt;
&lt;br /&gt;
Strictly speaking, the CCB is responsible for managing the change control process. The CCB is aided by the CAB, consisting of subject matter experts (SMEs) who can advise on the risk of making (or even not making) a change. Some organizations also have a change configuration board which focuses on specific configuration changes such as firewall and port configurations. The CCB is aided by the release coordination function which is responsible for managing the change calendar.&lt;br /&gt;
&lt;br /&gt;
A sub-set of the CAB (an Emergency Change Advisory Board)  is sometimes used to make decisions about clear-cut high impact Emergency Changes. Membership of the ECAB may be decided at the time a meeting is called, and depends on the nature of the Emergency Change.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Change Board Member&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Change Advisory Board&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Change Manager (Process)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Change Manager controls the lifecycle of all changes, and receives guidance on potential impacts from the Change Advisory Board.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Compliance Officer (CCO)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A chief compliance officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Data Officer (CDO) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A chief data officer (CDO) is a corporate officer responsible for enterprise wide governance and utilization of information as an asset, via data processing, analysis, data mining, information trading and other means. CDOs report mainly to the Chief Executive Officer (CEO).&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Financial Officer (CFO) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;??&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Information Officer (CIO)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Chief information officer (CIO) is an executive job title commonly given to the person at an enterprise in charge of information technology (IT) strategy and the computer systems required to support an enterprise's objectives and goals.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Risk Officer (CRO) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings. The position is sometimes called chief risk management officer or simply risk management officer.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Chief Technology Officer (CTO) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A chief technology officer (CTO), sometimes known as a chief technical officer, is an executive-level position in a company or other entity whose occupation is focused on scientific and technological issues within an organization.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;C-Level Officers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The highest-level executives in senior management usually have titles beginning with &amp;quot;chief&amp;quot; forming what is often called the C-suite. Such officers are chief executive officer (CEO), chief operations officer (COO), chief financial officer (CFO), and so on. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Communications Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Communications managers are responsible for conveying an organization's internal and external messages. Communications management is the systematic planning, implementing, monitoring, and revision of all the channels of communication within an organization, and between organizations; it also includes the organization and dissemination of new communication directives. May include Marketing communications managers.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Compliance Manager/&amp;lt;br /&amp;gt;Agent/&amp;lt;br /&amp;gt;Auditor (external) )&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Compliance Manager's responsibility is to ensure that appropriate standards and guidelines are used, that proper, consistent accounting or other practices are being employed, and  that external legal requirements are met.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Configuration Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Configuration Manager is responsible for maintaining current  information about all Configuration Items required to deliver IT services, including maintaining a logical model of the components of the IT infrastructure (CIs) and their associations.&lt;br /&gt;
This position should not to be confused with the Software Configuration Manager, who controls changes to software under development until it is released to Operations.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Consumer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;End user of the service or solution.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Continual Service Improvement (CSI) Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Continual Service Improvement (CSI) Manager is responsible for managing improvements to IT Service Management processes and IT services by continually measuring the performance of  services and design improvements to processes, services and infrastructure in order to increase efficiency, effectiveness, and customer satisfaction. Continual Service Improvement follows the tenets of Total Quality Management.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Contracts Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The role of the Contracts Manager is to develop and implement procedures for contract management and administration in compliance with company policy; as appropriate, to contribute to or influence company policies and to monitor compliance by company employees with established procedures.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Customer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;End user of a service or product.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Data Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A data architect is responsible for designing, creating, deploying and managing an organization's data architecture. A data architecture is composed of models, policies, rules or standards that govern which data is collected, and how it is stored, arranged, integrated, and put to use in data systems and in organizations.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Data Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1. Data Resource Management is the development and execution of architectures, policies, practices, and procedures that properly manage the full data lifecycle needs of an enterprise. (Definition from DAMA International)&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Administrative process by which the required data is acquired, validated, stored, protected, and processed, and by which its accessibility, reliability, and timeliness is ensured to satisfy the needs of the data users  www.businessdictionary.com/&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Data Modeler&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Data modeler is responsible for what is often the first step in database design and object-oriented programming as the designers first create a conceptual model of how data items relate to each other. Data modeling involves a progression from conceptual model to logical model to physical schema.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Data Quality Team &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This team is responsible for data quality management, which entails the establishment and deployment of roles, responsibilities, policies, and procedures concerning the acquisition, maintenance, dissemination, and disposition of data.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Demand Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Demand Manager is responsible for understanding, anticipating, and influencing customer demand for services and works with capacity management to ensure that the service provider has sufficient capacity to meet the required demand.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Deployment Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Deployment Manager oversees plans and execution of software and hardware updates, migration, and remote maintenance projects tasks for enterprise information systems.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Disaster Recovery Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Disaster Recovery Team consists of members responsible for restoring service across the organization.&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Facilities — General Responsibility &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Hardware — Replacing and restoring all servers, desktops, and other devices&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Applications/Data — Obtaining backups, restoring data, and loading software images&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Network — Replacing and restoring fiirewall, routers, cabling, and other equipment to make data available&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;External Services — Restoring power, Internet, and phone services&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Engineering — Ensuring that the environment is safe and suitable for work &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Finance — Providing approval for spending and documentation for insurance&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Human Resources — Contacting people to report or not report, and providing support&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Media Relations — Contacting media, coordinating information to public&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Management — Liaising with boards, making critical decisions, removing obstacles &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt; &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Analyst&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This role covers a wide spectrum of specific roles, from technology analyst to business analyst, or Database, Networking, Programming, Systems Analyst&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Community&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This term may apply to the people in the EIT organization or to the wider group of professionals in information technology who work for private companies, government agencies, educational institutions and any other entity that relies on computers for their daily operations. They install computer servers, design computer programs, provide technical support to staff members, install networks and keep business and customer data secure.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Engineer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This broad term may refer to anyone who is employed in the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. Generally, it applies to all EIT staff.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;mbers of this team include all managers responsible for the  process of planning, organizing and executing activities for the successful achievement of the EIT organizations' specific information technology goals&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See EIT Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Product Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This role has long existed in software and hardware product companies, but is emerging in EIT. Responsibilities include:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Managing the entire product line life cycle from strategic planning to tactical activities&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Specifying customer requirements for current and future products by conducting market research in conjunction with on-going discussions with business units to determine and prioritize needed functionality.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Driving a solution set across development through market requirements, product contract, and positioning in the EIT portfolio.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Developing and implementing a company-wide launch plan, working with all departments to execute.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Analyzing potential partner relationships for the product.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;EIT Service Continuity Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The IT Service Continuity Manager is responsible for managing risks that could seriously impact IT services by reducing the risks to an acceptable level and planning for the recovery of IT services, ensuring that the IT service provider can provide minimum agreed service levels in cases of disaster. (See also Risk Manager.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Enterprise Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Enterprise Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Enterprise Risk Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Risk Manager is responsible for identifying, assessing and controlling risks by analyzing the value of assets to the business, identifying threats to those assets, and evaluating how vulnerable each asset is to those threats.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Executive Sponsor &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;??&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Facilities Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Facilities Manager is responsible for managing the physical environment, for example power and cooling, building access management, and environmental monitoring – anything that is part of the physical environment where the IT infrastructure is located.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Financial Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Financial Manager is responsible for managing an IT service provider's budgeting, accounting and charging requirements.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Governance Body&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A group of people who formulate policy and direct an institution along with its management.   (for a specified level in context)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Information Security Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Information Security Manager is responsible for ensuring the confidentiality, integrity and availability of an organization’s assets, information, data and IT services, and is Security Management for the entire organization.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Infrastructure Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;??&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Internal Messaging Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;??&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Knowledge Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Knowledge Manager’s goal is to improve efficiency by reducing the need to rediscover knowledge by ensuring that the IT organization is able to gather, analyze, store and share knowledge and information.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Operations Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Operations Manager manages day-to-day infrastructure operations to provide delivery of systems and services in order to meet or exceed agreed services levels.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Operations Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Supports Operations Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Operations Team Member / Operations Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Supports Operations Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Portfolio Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Portfolio Manager provides managers with an inventory of the company's software applications and metrics to illustrate the business benefits of each application to support decisions about building, buying, maintaining and retiring applications.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Problem Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The Problem Manager is responsible for managing the lifecycle of all Problems. For this,  s/he maintains information about Known Errors and Workarounds&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;In ITIL terms, this role differs from Incident Manager, who is responsible for effective implementation of the Incident Management process to help restore service to the user and carries out the corresponding reporting. S/he represents the first stage of escalation for Incidents. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Incident management handles any unplanned interruption to or quality reduction of an IT service, whereas problem management handles the root causes of incidents.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Process Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Process Architect is responsible for maintaining the Process Architecture (part of the Enterprise Architecture), coordinating all changes to processes and making sure that all processes cooperate in a seamless way. This role often supports all parties involved in managing and improving processes, in particular the Process Owners and Change Managers. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Process Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Process Owner is responsible for ensuring that a given process serves its designated purpose and interfaces appropriately with other processes by sponsorship, design, and continual improvement of the process and its metrics. Larger organizations may have separate Process Owner and Process Manager roles, where the Process Manager has responsibility for the operational management of a process.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Procurement Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Procurement Manager  duties include identifying suppliers, comparing prices, specifications, terms and delivery dates to determine the optimum one to utilize, preparing purchase orders and subcontracts, responding to internal and supplier inquiries, reviewing requisition orders to verify accuracy, specifications and terminology. Must prepare, maintain and review purchasing records, produce management reports, track the status of requisitions, contracts and orders, approve bills for payment, monitor contractor performance, calculate the cost of orders, assign invoices to the appropriate accounts, and monitor in-house inventory transfer for project consumption.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Procurement Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Procurement Manager.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Project Management Office (PMO) &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Project Management Office (PMO) is a group or department in an enterprise that establishes and implements best practices and maintains standards related to project management, planning and execution. The PMO also serves as an organization's central hub for project documentation, guidance and success metrics.  https://www.techopedia.com&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Project Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Project Manager is responsible for planning, acquiring and coordinating the resources to complete a given project within the predicted cost, time and quality estimates.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Quality Analyst&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Quality Analyst is responsible for the systematic examination of the extent to which an EIT product is capable of satisfying stated and implied needs &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Quality Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Quality Manager role is responsible for quality management which includes the processes and activities of the performing organization that determine quality policies, objectives, and responsibilities so that the project will satisfy the needs for which it was undertaken.  While not limited to testing, quality management sets standards  for planning, performing and reporting testing and results.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Quality Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Quality Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Regulatory Authority &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Any entity whose Regulatory requirements demand an organization's adherence to laws, regulations, guidelines and specifications relevant to its business. Violations of regulatory compliance regulations often result in legal punishment, including federal fines.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Release Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Release Manager is responsible for overseeing and controlling the movement of Releases from Construction and test to transition and live environments. This role may be performed by a senior software configuration manager. The primary objective is to ensure that the integrity of the live environment is protected and that the correct components –as tested and approved--are released into the proper environment(s).&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Release Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Release Manager.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Risk Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This role has overall responsibility for  the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Security Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Security Architect, more properly the Information Security Architect, is responsible for the enterprise security architecture , providing  the conceptual design of the network security infrastructure, related security mechanisms, and related security policies and procedures. The enterprise security architecture links the components of the security infrastructure as one cohesive unit. The goal of this cohesive unit is to protect corporate information.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Security Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The IT Security Manager performs two core functions for the enterprise. The first is overseeing the operations of the enterprise’s security solutions through management of the organization’s security analysts. The second is establishing an enterprise security stance through policy, architecture and training processes.  http://www.itbusinessedge.com/itdownloads/job-description-it-security-manager/88518 accessed 11/11/2016&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Catalog Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Catalogue Manager is responsible for maintaining the Service Catalogue, ensuring that all information within the Service Catalogue is accurate and up-to-date.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Design Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Design Manager is responsible for producing quality, secure and resilient designs for new or improved services, as well as producing and maintaining all design documentation.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Level Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Level Manager is responsible for negotiating Service Level Agreements and ensuring that they are met, making sure that all IT Service Management processes, Operational Level Agreements and Underpinning Contracts are appropriate for the agreed service level targets. The Service Level Manager also monitors and reports on service levels.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Manager represents all EIT provided services to users and is responsible for overall ABC Customer Satisfaction withl Service Support and Service Delivery actions taken to ensure they meet   business needs as well as EIT requirements.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Owner&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Owner is responsible for delivering a particular service within the agreed service levels, typically acting as the counterpart of the Service Level Manager when negotiating Operational Level Agreements (OLAs).&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Portfolio Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Portfolio Manager decides on a strategy to serve customers in cooperation with the IT Steering Group, and develops the service provider's offerings and capabilities.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Request Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The duty of providing information to the user is part of the Service Request Management. Its most important actor  is the Service Desk. The Service Desk is basically responsible for the Acceptance, Classification and routing and reporting of requests.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Service Strategy Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Service Strategy Manager is responsible for communicating and implementing the service strategy.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Solution Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Handles requests for customized operational solutions. Consults with business and EIT staff to identify solution requirements. Coordinates solution build activities with Release Analyst.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Solution Architecture Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Solution Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Solution Developer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Solution Developers play a key role in the design, installation, testing and maintenance of application software, and leverage information technology to solve business problems through decision support, analytics, and data warehousing systems. Based on project requirements,  may be responsible for coding entirely new custom software applications, or  may use ‘off the shelf’ software that may require modification and integration into an existing system to meet business needs.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Solution Management Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Solution Management works with project stakeholders (including customers) to create and maintain the product’s vision, roadmap, value stream, and make sure that requirements for third-party capabilities are well-understood. They work with customers to build and prioritize the solution backlog.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Stockholders&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1. Intended meaning in this context: An individual, group, or organization that holds one or more shares in a company, and in whose name the share certificate is issued. Also called shareholder.&lt;br /&gt;
2. British: A company or individual who holds supplies for manufacturers. See http://www.businessdictionary.com/definition/stockholder.html&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Subject Matter Expert (SME)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Subject Matter Expert is defined as follows: [p]erson with direct knowledge of what is done in the job, what knowledge, skills, abilities and other characteristics (KSAOs) are required, and the general background of persons who are able to do the job successfully. These may include those currently doing the job, recent incumbents, those who supervise others doing the job, and other acknowledged job experts.  See http://definitions.uslegal.com/s/subject-matter-expert/.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Supplier Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Supplier Manager is responsible for ensuring that suppliers deliver value, making sure that contracts with suppliers support the needs of the business, and that all suppliers meet their contractual commitments.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Support Team (1st, 2nd, 3rd Level)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;strong&amp;gt;1st Level Support&amp;lt;/strong &amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;The responsibility of 1st Level Support is to register and classify and document  received Incidents in the appropriate database and to supply known corrective advice or work-arounds.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If no solution can be provided,   the Incident is transferred to 2nd Level Support. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;1st Level Support also processes Service Requests and keeps users informed about their Incidents' status at agreed intervals.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;2nd Level Support&amp;lt;/strong&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;These are service specialists who provide in-depth technical expertise and may adjust the incident information supplied by first level support in the database&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If necessary, 2nd Level Support will request external support, e.g. from software or hardware providers. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If no solution is achieved, work performed is documented in the database and the Incident is passed on to Problem Management.&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;3rd Level Support&amp;lt;/strong&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;3rd Level Support is typically provided by hardware or software providers (whether in-house or third-party suppliers). Depending on the severity of the  incident, the solution may be deferred to the next release or supplied as a hardware replacement, software patch or full update.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;System Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The System Architect is responsible for a comprehensive solution based on principles, concepts, and properties logically related and consistent with each other. The solution architecture has features, properties, and characteristics satisfying, as far as possible, the problem or opportunity expressed by a set of system requirements (traceable to mission/business and stakeholder requirements) and life cycle concepts (e.g., operational, support) and are implementable through technologies (e.g., mechanics, electronics, hydraulics, software, services, procedures, human activity).&lt;br /&gt;
http://sebokwiki.org/wiki/System_Architecture&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;System Specialist&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An information technology specialist applies technical expertise to the implementation, monitoring, or maintenance of IT systems. Specialists typically focus on a specific computer network, database, or systems administration function. &lt;br /&gt;
http://www.webopedia.com/TERM/I/information_technology_specialist.html&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Team Manager / Lead&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The team manager is the leader of a group of employees, overseeing the daily operations of one section within a company. These leaders must perform a wide range of duties that correspond to the kind of team they manage. ... A team manager may use certain principles to manage the team.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Technical Analyst&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Technical Analyst provides technical expertise and support  in the technical aspects of designing, testing, operating and improving IT services. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Technology Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A technical architect is responsible for defining the overall structure of a program or system, ensuring a quality system design which provides good system performance, an effective human-machine interface, optimal operational cost, and flexibility for future change. In addition, the role often provides a focal point for all technical issues and initiatives on the project,   ensuring that all components of the technical architecture are properly implemented.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Test Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Test Manager verifies that proper testing occurs for all changes to be released into the production environments, that Releases and the resulting services meet the project’s Release Criteria and that IT operations is able to support the new service.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Test Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Test Manager, Tester&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Tester&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Tester is responsible for  executing assigned tests, verifying defects, and correctly documenting all related information in the defect database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Training Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Trainer.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Trainer, technical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Technical Trainer is responsible for preparing, conducting, and evaluating technical training programs, writes literature and materials to be used in programs and designs exercises to enhance lectures, conducts classes regarding safety, security, installation, programming, maintenance, and/or repair of software, machinery, and equipment.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Transition Architect&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TBD&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Transition Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Transition Manager coordinates activities that are needed for Service Transition:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Transition Planning and Support&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Change Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Release and Deployment Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Service Validation and Test&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Service Asset and Configuration Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;End of Service Life Cycle&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Knowledge Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;User  (Service User)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See Consumer&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;User Experience (UX) Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;UX defines interaction models, user task flows, and UI specifications, and communicates scenarios, end-to-end experiences, interaction models, and screen designs to stakeholders, develops and maintains design wireframes, mockups, and specifications.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;User Experience Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;See User Experience (UX) Manager&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Verification &amp;amp; Validation (V&amp;amp;V) Team&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and specifications and that it fulfills its intended purpose.&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Validation is intended to ensure a product, service, or system (or portion thereof, or set thereof) results in a product, service, or system (or portion thereof, or set thereof) that meets the operational needs of the user.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Verification is intended to check that a product, service, or system (or portion thereof, or set thereof) meets a set of design specifications.&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Vendor&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Seller of equipment, services, or other items of interest&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Key_Standards&amp;diff=1769</id>
		<title>Key Standards</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Key_Standards&amp;diff=1769"/>
				<updated>2017-03-19T21:26:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
    &amp;lt;table&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki.  Like all wikis, it is a work in progress and may contain errors.  We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Purpose of this Standards Guide&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This guide is designed for software producers, as well as producers of systems with embedded software. The purpose of this guide is to help informatics practitioners ensure that developed and deployed systems and software have the following characteristics:&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;They can be and are verified and validated.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;They meet the purpose for which they are intended.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;They are robust, reliable and resilient enough to consistently perform to their intended use.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;IEEE System and Software Engineering Standards are as critical to industry as they have been to space exploration. This guide introduces you to the core subset of S2ESC’s portfolio of standards.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;The Value of System and Software Standards to Industry&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The aggressive transition to technology-based information is successful only if software and software-intensive systems &amp;amp;mdash; which encompass myriad products and processes in complex ways &amp;amp;mdash; seamlessly collect, aggregate, share, analyze, and present dynamic information in a timely manner.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;For example, the anticipated human and economic benefits from the present rapid transition to health information technologies demand that software and systems developers of medical devices, digital medical records, and administrative, financial, and regulatory systems (e.g., public health, service/healthcare providers, and payers) design, develop, and deliver interoperable products, processes, and services that are safe, secure, reliable, and robust. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The application of IEEE S2ESC systems and software standards helps software producers by ''simplifying product development processes'', ''avoiding the pitfalls that have overcome many software projects'', and thus ''reduces non-value-adding efforts and costs''. Adoption and implementation of the core software and systems engineering standards across companies that produce or tailor information systems and devices ''increases their development organization’s ability to deliver robust software in shorter time frames.'' Even more important, the consistent use of these IEEE standards lowers the risks of delivering faulty products.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Standards for Software and Systems Engineering encompass the full software and systems life cycles, from concept and development to delivery and maintenance, and even the reuse of software components. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Standards Essential To Informatics Technology Producers&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Ensuring that delivered software meets its purpose and consistently performs to its intended use is vital to effective information delivery. As fundamental building blocks for international systems and software development, IEEE Software and Systems Engineering Standards help producers ensure interconnectivity, interoperability and verification of new informatics products and systems enabling the rapid implementation and trusted use of medical technologies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The essential set [[#One|[1]]] of IEEE System and Software Standards that are key to the development and delivery of robust software and systems are listed in the table below.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Table 1. Essential Standards&amp;lt;/strong&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;10&amp;quot; width=&amp;quot;900&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;20%&amp;quot; style=&amp;quot;background-color: #58ACFA&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Number'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;20%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Official Designation'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Name'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;730&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 730&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software Quality Assurance Plans&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;828&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 828&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software Configuration Management&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;830&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 830&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Recommended Practice for Software Requirements Specifications. This standard was contributed to ISO and is now replaced by ISO/IEC/IEEE 29148.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software Unit Testing.  This standard was contributed to ISO and is now replaced by ISO/IEC/IEEE 29119-4.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1012&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1012&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for System and Software Verification and Validation&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1016&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1016&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Recommended Practice for Software Design Descriptions&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1028&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 1028&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software Reviews and Audits&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1058&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1058&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software Project Management Plans.  This standard is inactive, but contributed to ISO/IEC/16326.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1063&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1063&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Software User Documentation.  This standard was contributed to ISO and is now superceded by ISO/IEC/IEEE 26514 Systems and Software Engineering--Requirements for designers and developers of user documentation.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1074&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 1074&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Standard for Developing a Software Project Life-cycle Process. This standard was contributed to ISO.It has not been superceded, but ISO/IEC/IEEE 24774 presents guidelines for the elements used most frequently in describing a process: the title, purpose, outcomes, activities, task and information item&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;12207&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;ISO/IEC/IEEE 12207&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Systems and Software Engineering &amp;amp;mdash; life-cycle processes&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;14764&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IEEE Std 14764&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Software Engineering &amp;amp;mdash; System Life-cycle Processes &amp;amp;mdash; Maintenance&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;15288&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;ISO/IEC/IEEE 15288&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Systems and Software Engineering &amp;amp;mdash; Systems life-cycle processes&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;12207&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;ISO/IEC/IEEE 20000-1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Information Technology &amp;amp;mdash; Service management &amp;amp;mdash; Part 1: Service Management System requirements&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Table 2. Additional Important Standards'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;10&amp;quot; width=&amp;quot;900&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td width=&amp;quot;20%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Number'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;td width=&amp;quot;20%&amp;quot; style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Official Designation'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;td style=&amp;quot;background-color: #58ACFA;&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''Name'''&amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;829&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 829&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Standard for Software and System Test Documentation was contributed to ISO and is superceded by ISO/IEC/IEEE 29119-3&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1044&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 1044&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Standard Classification for Software Anomalies&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1062&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 1062&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Recommended Practice for Software Acquisition&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1233&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 1233&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Guide for Developing System Requirements Specifications  was contributed to ISO and is superceded by ISO/IEC/IEEE 29148&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1362&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Std 1362&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;IEEE Guide for Information Technology-System Definition-Concept of Operations (ConOps) Document was contributed to ISO and superceded by ISO/IEC/IEEE 29148&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;15939&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;ISO/IEC/IEEE Std 15939&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Systems and Software Engineering--Measurement Process&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Short Descriptions of a Sampling of the Standards&amp;lt;/h2&amp;gt;&lt;br /&gt;
Please note that many EIT-relevant standards can be downloaded for free at http://standards.iso.org/ittf/PubliclyAvailableStandards.&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 730: Software Quality Assurance Plans&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' The standard specifies the format and content of software quality-assurance plans. It meets the IEEE/EIA 12207.1 requirements for such plans.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The SQA plan defines the means to ensure that software developed for a specific product satisfies the user’s requirements and is of the highest quality possible within project constraints. To do so, it must first ensure that the quality target is clearly defined and understood. It must consider management, development, and maintenance plans for the software. [[#Two|[2]]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 828: Software Configuration Management&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This  standard explains CM, including identifying and acquiring configuration items, controlling&lt;br /&gt;
changes, reporting the status of configuration items, as well as software builds and release&lt;br /&gt;
engineering. It addresses what CM activities are to be done, when they are to happen in the&lt;br /&gt;
life cycle, and what planning and resources are required. It also describes the content areas for a&lt;br /&gt;
CM Plan. The standard supports ISO/IEC/IEEE 12207:2008 and ISO/IEC/IEEE 15288:2008 and&lt;br /&gt;
adheres to the terminology in ISO/IEC/IEEE Std 24765 and the information item requirements of&lt;br /&gt;
IEEE Std 15939&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1012: System and Software Verification and Validation&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' Software verification and validation (V&amp;amp;V) processes determine whether the development products of a given activity conform to the requirements of that activity and whether the software satisfies its intended use and user needs. Software V&amp;amp;V life-cycle process requirements are specified for different software integrity levels. The scope of V&amp;amp;V processes encompasses software-based systems, computer software, hardware, and interfaces. This standard applies to software being developed, maintained, or reused (legacy, commercial off-the-shelf (COTS), non-developmental items). The term software also includes firmware, microcode, and documentation. Software V&amp;amp;V processes include analysis, evaluation, review, inspection, assessment, and testing of software products.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1016: Software Design Descriptions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' The necessary information content and recommendations for an organization for software design descriptions (SDDs) are described. An SDD is a representation of a software system that is used as a medium for communicating software design information. This recommended practice is applicable to paper documents, automated databases, design description languages, or other means of description.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1028: Software Reviews and Audits&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' Five types of software reviews and audits, together with procedures required for the execution of each type, are defined in this standard. This standard is concerned only with the reviews and audits; procedures for determining the necessity of a review or audit are not defined, and the disposition of the results of the review or audit is not specified. Types included are management reviews, technical reviews, inspections, walk-throughs, and audits. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1044: Classification for Software Anomalies&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' A uniform approach to the classification of anomalies found in software and its documentation is provided. The processing of anomalies discovered during any software life-cycle phase are described, and comprehensive lists of software anomaly classifications and related data items that are helpful to identify and track anomalies are provided. This standard is not intended to define procedural or format requirements for using the classification scheme. It does identify some classification measures and does not attempt to define all the data supporting the analysis of an anomaly. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1058/ISO/IEC/IEEE 16326: Software Project Management &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This International Standard specifies the required content of the project management plan (PMP). It also quotes the extracted purpose and outcome statements from the project processes&lt;br /&gt;
of ISO/IEC 12207:2008 (IEEE Std 12207-2008) and ISO/IEC 15288:2008 (IEEE Std 15288-2008), and adds&lt;br /&gt;
detailed guidance for managing projects that use these processes for software products and software intensive systems..&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1062: Software Acquisition&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This standard provides a set of useful quality practices for use during one or more steps in a software acquisition process. This recommended practice can be applied to software that runs on any computer system regardless of the size, complexity, or criticality of the software, but is more suited for use on modified-off-the-shelf software and fully developed software.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 1074: Developing a Software Project Life-cycle Process [Inactive]&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This standard provides a process for creating a software project life-cycle process (SPLCP). It is primarily directed at the process architect for a given software project. IEEE Std 1074 is unique in that it specifies, for any activity, what inputs are needed from previous activities, so that activities can be chained together. It also provides activities for ensuring that security is built in throughout the software life cycle.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This standard requires selection of a user’s software project life-cycle model (SPLCM) based on the organization’s mission, vision, goals, and resources. It does not impose, define, or imply a particular software life-cycle model or methodology.  &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This standard may also be used to develop organizational processes to support software development and maintenance or to develop special, single-function processes within a project.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 12207: Systems and Software Engineering &amp;amp;mdash; Software Life-cycle Processes&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This international standard establishes a common framework for software life-cycle processes, with well-defined terminology, that can be referenced by the software industry. It applies to the acquisition of systems and software products and services, to the supply, development, operation, maintenance, and disposal of software products and the software portion of a system, whether performed internally or externally to an organization. Those aspects of system definition needed to provide the context for software products and services are included. Software includes the software portion of firmware. This revision integrates ISO/IEC 12207 with its two amendments and was coordinated with the parallel revision of ISO/IEC 15288 (system life-cycle processes) to align structure, terms, and corresponding organizational and project processes. This standard may be used stand alone or jointly with ISO/IEC 15288, and supplies a process reference model that supports process capability assessment in accordance with ISO/IEC 15504-2 (process assessment). &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;IEEE Std 14764: Standard for Software Engineering &amp;amp;mdash; Software&lt;br /&gt;
Life Cycle Processes &amp;amp;mdash; Maintenance&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' The process for managing and executing software maintenance activities is described.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;IEEE Std 14764 describes in greater detail management of the maintenance process described in IEEE Std 12207, including amendments. It also establishes definitions for the various types of maintenance. IEEE Std 14764 provides guidance that applies to planning, execution and control, review and evaluation, and closure of the maintenance process. The scope includes maintenance for multiple software products with the same maintenance resources.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;IEEE Std 14764 provides guidance for the maintenance of software. The basis for the maintenance process and its activities comes from the definitions of IEEE Std 12207. It defines the activities and tasks of software maintenance, and provides maintenance planning requirements. It does not address the operation of software and the operational functions, such as backup, recovery, and system administration. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;ISO/IEC/IEEE Std 15288: Systems and Software Engineering &amp;amp;mdash; Software Life-cycle Processes&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This international standard establishes a common process framework for describing the life cycle of man-made systems. It defines a set of processes and associated terminology for the full life cycle, including conception, development, production, utilization, support, and retirement. This standard also supports the definition, control, assessment, and improvement of these processes. These processes can be applied concurrently, iteratively, and recursively to a system and its elements throughout the life cycle of a system.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;ISO/IEC/IEEE 29148: Systems and software engineering &amp;amp;mdash; Life cycle processes &amp;amp;mdash;Requirements engineering &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;'''Abstract:''' This standard replaces IEEE 830-1998, IEEE 1233-1998, IEEE 1362-1998. ISO/IEC/IEEE 29148:2011 contains provisions for the processes and products related to the engineering of requirements for systems and software products and services throughout the life cycle. It defines the construct of a good requirement, provides attributes and characteristics of requirements, and discusses the iterative and recursive application of requirements processes throughout the life cycle.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h3&amp;gt;The IEEE Software Engineering Body of Knowledge (SWEBOK)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;In this guide, the IEEE Computer Society establishes for the first time a baseline for the body of knowledge for the field of software engineering, and the work partially fulfills the Society’s responsibility to promote the advancement of both theory and practice in this field. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It should be noted that this guide does not purport to define the body of knowledge but rather to serve as a compendium and guide to the evolving body of knowledge that continues to develop. &lt;br /&gt;
The body of knowledge is subdivided into ten software engineering knowledge areas (KAs) plus an additional chapter providing an overview of the KAs of strongly related disciplines. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;References&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;One&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[1] This set is available from IEEE on the ''Essentials'' CD. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Two&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[2] Guide to SWEBOK 2004. 2.1.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Three&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[3] Guide to SWEBOK 2004. 2.1.1.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Four&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[4] Guide to SWEBOK 2004. 5.2.2.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Five&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[5] Guide to SWEBOK 2004. 5.2.1.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Six&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[6] Guide to SWEBOK 2004. Foreword.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Seven&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;[7] Guide to SWEBOK 2004. Preface.&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Enterprise_IT_Skill_Frameworks&amp;diff=1768</id>
		<title>Enterprise IT Skill Frameworks</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Enterprise_IT_Skill_Frameworks&amp;diff=1768"/>
				<updated>2017-03-19T21:26:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
    &amp;lt;table&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki.  Like all wikis, it is a work in progress and may contain errors.  We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; Competency Frameworks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The emphasis on competence has become international as Enterprise IT and ICT in general have become indispensible across the globe. They derive from a growing understanding of the need for a common language for competences, knowledge, skills and proficiency levels that can be understood across national borders. A common framework  enables the identification of skills and competences that may be required to successfully perform duties and fulfill responsibilities in an EIT workplace.  They provide a common basis for the selection and recruitment of EIT staff, as well as forming the basis for employment agreements, professional development plans, and  performance evaluation for ICT professionals.&amp;lt;/p&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;p&amp;gt;Many national and regional governments have come to require certification of EIT practitioners. Accordingly, they have had to develop their own definitions of ICT competences. Given the increasingly international composition of the EIT workforce, the EITBOK has included information from 3 major frameworks that are emerging as inter-regional. In general, these frameworks work towards a common understanding of competence, defined by the e-CF, for example, as “demonstrated ability to apply knowledge, skills and attitudes to achieve observable results.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Creating mappings between these frameworks and our chapters is challenging, because they come from different perspectives and have different goals. There is rarely a 100% correspondence between the frameworks and our chapters, and, despite careful consideration some subjectivity was used to create the mappings.  Please take that in consideration as you review them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Skills Framework for the Information Age&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt; SFIA has been used for some 26 years and developed using a collaborative approach. The internationally represented SFIA Council oversees the direction of development for the not-for-profit SFIA Foundation, which  owns and regularly updates the framework, using a well-established open process,  for the benefit of the IT industry and IT professionals.  The SFIA Framework has been translated in to 6 languages (English, Spanish, German, Arabic, Japanese and Chinese with more languages scheduled including French and French Canadian). It has been downloaded and used by organizations and individuals in nearly 180 countries. It can be downloaded for free at www.sfia-online.org.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The SFIA Framework identifies 97 professional skills across IT and supporting areas and 7 levels of responsibility.  The 7 levels in the SFIA Framework are used to provide generic levels of responsibility and to reflect experience and competency.  The SFIA Framework is based on demonstrated ability of applying a skill at a particular level, employing professional and behavioural skills as well as knowledge. The definitions describe the behaviors, values, knowledge and characteristics that an individual should have in order to be considered competent at a particular level. Underlying each SFIA Level are generic responsibilities of Autonomy, Complexity, Influence and Business Skills.  These are described at each SFIA Level. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:SFIA_ResponsibilityLevels.png]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig1&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 1. SFIA Levels of Responsibility'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The 97 IT skills of the SFIA Framework are grouped into categories and sub-categories, a skill has a name, a code, a skill description and a level description (for that skill at each level practiced).&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;15%&amp;quot;&amp;gt;Attribute&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;General Responsibilities&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The generic responsibility attributes delineated for all skills at all SFIA Levels:&lt;br /&gt;
&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Autonomy&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Complexity&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Influence&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Business Skills&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Skill Category&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;A logical grouping of the skills for the purposes of navigation.&lt;br /&gt;
[[File:SFIA_SkillCategories.png]]&lt;br /&gt;
These categories are further broken down into sub-categories.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Skill Name&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;The name of the skill&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Skill Description&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;A description of what the skill is without reference to the levels practiced&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Level Descriptors&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;p&amp;gt;A description of the skill for each of the levels practiced, phrased to facilitate their use as professional competencies.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 1 — Completes work tasks under close supervision. Seeks guidance in unexpected situations. Has an organized approach to work. Works with immediate colleagues only.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 2 — Uses some discretion to resolve issues or deal with enquiries. Works on a range of tasks, and proactively manages personal development.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 3 — Works under general direction only but has worked reviewed at regular intervals. Knows when to escalate problems / questions to a higher level. Works with suppliers and customers. May have some supervisory responsibility for less experienced staff. Performs a broad range of tasks, some complex. Plans schedules and monitors own work. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 4 — Has substantial personal responsibility and autonomy. Plans own work to meet objectives and execute end to end processes. Makes decisions which influence the success of projects and team objectives. Executes a broad range of complex technical or professional activities.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 5 — Broad direction,, objective setting responsibility. Influences organization. Build effective working relationships. Performs Challenging and unpredictable work. Self-sufficient in business skills. Advises others on standards methods and tools.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 6 — Has authority for a significant area of work. Sets organizational objectives. Influences policy, customers and suppliers at a senior level. Performs Highly complex and strategic work. Initiates and leads technical and business change.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Level 7 — At the highest organisational level, has authority over all aspects of a significant area of work, including policy formation and application. Makes decisions critical to organisational success. Inspires the organisation, and influences developments within the industry at the highest levels. Develops long-term strategic relationships.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;European Competency Framework&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt; The European e-Competence Framework (e-CF) from the European Union provides a reference of 40 competences required for performance in the Information and Communication Technology (ICT) workplace, using a common language for competences, knowledge, skills and proficiency levels that can be understood across Europe. The use of the e-CF by companies and organisations throughout Europe supports the transparency, mobility and efficiency of ICT sector related human resources planning and development.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt; As the first sector-specific implementation of the European Qualifications Framework (EQF), the e-CF can be used by ICT service, demand and supply organizations, and by managers and HR departments, for education institutions and training bodies, including higher education, by professional associations, trade unions, market analysts and policy makers, and other organisations and parties in public and private sectors. The structure of the framework is based on four dimensions:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Dimension 1&amp;lt;/td&amp;gt;  &lt;br /&gt;
&amp;lt;td&amp;gt;5 e-Competence areas, derived from the ICT business macro-processes PLAN – BUILD – RUN – ENABLE – MANAGE. Main aim of dimension 1 is to facilitate navigation through the framework&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt; &amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Dimension 2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A set of reference e-Competences for each area, with a generic description for each competence. 40 competences identified in total provide the European generic reference definitions of the framework.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt; &amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Dimension 3&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Proficiency levels of each e-Competence provide European reference level specifications on e-Competence levels e-1 to e-5, which are related to EQF levels 3-8.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt; &amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;Dimension 4&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Samples of knowledge and skills relate to e-Competences in dimension 2. They are provided to add value and context and are not intended to be exhaustive.&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt; There are five e-CF proficiency levels, e-1 to e-5, which relate to EQF learning levels 3 to 8. For a description of the EQF levels, please see https://ec.europa.eu/ploteus/en/content/descriptors-page. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th align=&amp;quot;center&amp;quot;&amp;gt;e-Competence Level&amp;lt;/th&amp;gt;&amp;lt;th align=&amp;quot;center&amp;quot;&amp;gt;EQF Level&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td  align=&amp;quot;center&amp;quot;&amp;gt;5 (highest)&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;4&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;4 and 5&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt; As in SFIA, not all skills are subject to all 5 levels. The following table shows the spread of competency levels for each skill.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:eCF_FrameworkOverview.png]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig3&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 3. The European Competency Framework Overview'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;The i Competency Dictionary&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The  i Competency Dictionary (iCD) was developed and is maintained by the Information Technology Promotion Agency (IPA)  in Japan. It consists of a comprehensive Task Dictionary and a corresponding  Skill Dictionary. The Task Dictionary contains all the tasks that EIT outsourcers or EIT departments are expected to accomplish, while the corresponding Skill Dictionary provides the skills required to perform those tasks. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The diagrams below show how the task and skill dictionaries are structured to be used together. The skills needed to become competent at each task are enumerated in a Task vs. Skill table. In each of the EITBOK chapters, we have shown one of the relevant tasks (at Task layer 2), along with its prerequisite skills from layers 2-4. In the diagrams below, we have indicated the number of tasks and skills that are included in the full iCD. The complete iCD Task Dictionary (Layers 1-4) and Skill Dictionary (Layers 1-4) can be obtained by returning the request form provided from: http://www.ipa.go.jp/english/humandev/icd.html &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Note that the IPA is also responsible for the Information Technology Engineers Examination (ITEE), which has grown into one of the largest scale national examinations in Japan, with approximately 600,000 applicants each year.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Task Dictionary&amp;lt;/h3&amp;gt;&lt;br /&gt;
The Task Dictionary is intended to be used and applied by companies and organizations to determine tasks in line with their business strategies or business plans. Tasks are used to define their organizational functions and the roles of personnel. The structure of the dictionary assumes a wide range of corporate activities, so that companies with any kind of business model can use and apply it. The Task Dictionary is comprised of four layers that are divided into three task layers plus the Task Evaluation Items layer (approx. 2,000 items).&lt;br /&gt;
&lt;br /&gt;
[[File:iCD_TaskDictionaryStructure.png]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig4&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 4. The iCD Task Dictionary Structure'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Task Dictionary Chart&amp;lt;/h3&amp;gt;&lt;br /&gt;
The Task Dictionary Chart can be used to obtain a bird’s-eye view of the entire Task Dictionary on the 1st  Layer Task level. This chart represents a task structure composed of the business lifecycle as vertical line (strategy, planning, development, utilization, evaluation/improvement)  and tasks associated with entire lifecycle as horizontal line (Management/Control, and Promotion/Support).&lt;br /&gt;
&lt;br /&gt;
[[File:ICD_IT Skill Frameworks.png|700px]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig5&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 5. The iCD Task Dictionary Chart'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Examples of Task Evaluation Diagnostic Level and Criteria&amp;lt;/h3&amp;gt;&lt;br /&gt;
This table is intended to define the task diagnostic level and Criteria. Diagnostic Criteria can be applied to task evaluation items or appropriate layer tasks to evaluate one’s task performance capability. The levels are from L0 to L4. This Diagnostic Criteria can be applied to individuals and  the total task performance capability is manipulated for each department by aggregating all department members result.&lt;br /&gt;
&lt;br /&gt;
[[File:ICD_DiagnosticCriteria.png|637px]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig6&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 6. Examples of Task Evaluation Diagnostic Level and Criteria'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Skill Dictionary&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Skills are capabilities required to handle associated knowledge items to execute a task. The Skill Dictionary is comprised of four layers divided into three skill layers plus Associated Knowledge Items (approx. 10,000 knowledge items). The Skill Dictionary refers and sorts the items from the major Body of Knowledges/processes and skill standards in the world. &lt;br /&gt;
&lt;br /&gt;
[[File:iCD_SkillDictionaryStructure.png]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig7&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 7. The iCD Skill Dictionary Structure'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Skill Dictionary Chart&amp;lt;/h3&amp;gt;&lt;br /&gt;
The Skill Dictionary Chart can be used to obtain a bird’s-eye view of the entire Skill Dictionary on the 1st and 2nd skill layers. The Skill Dictionary is divided into five categories based on the skill characteristics: methodology, technology, related knowledge, IT human skills, and specific skill (optional). This chart represents a skill structure on the perspectives of  the IT orientation (Horizontal line: High-Low) and the application area (Vertical line: Wide-Narrow).&lt;br /&gt;
&lt;br /&gt;
[[File:ICD_Skill Dictionary Related Knowledge Orientation.png|700px]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig8&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 8. The iCD Skill Dictionary Chart'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Skill Proficiency Level&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This chart measures the skill proficiency level using seven levels of skill proficiency criteria. Level 1 to 4 criteria differs according to contents of technology/methodology/related knowledge. Skill proficiency level 4 is the highest acquisition level of the skill for the task accomplishment. Level 5 to 7 criteria is defined across the categories to evaluate by social contribution degree as a professional.&lt;br /&gt;
&lt;br /&gt;
[[File:ICD_SkillProficiency.png|700px]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig9&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 9. Skill Proficiency Level'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Task Versus Skill Table&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Table 10 indicates with a dot in the related cell those skills that are associated with particular tasks. Displayed below is just a small portion of the complete table. This table is used to identify the skills corresponding to each task and vice versa. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:ICD_TaskvsSkillTable.png|700px]]&lt;br /&gt;
&amp;lt;div id=&amp;quot;Fig10&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;p&amp;gt;'''Figure 10. Task Versus Skill Table (extracted)'''&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;The IEEE Software Engineering Competency Model&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt; The software engineering competency model (SWECOM) describes competencies for software engineers who participate in development of and modifications to software-intensive systems. Skill areas, skills within skill areas, and work activities for each skill are specified. Activities are specified at five levels of increasing competency. Case studies of how the SWECOM model can be used by a manager, an employee, a new hire, or a curriculum designer are provided. Staffing Gap Analysis and Individual Gap Analysis worksheets are included in an appendix.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Individuals may download the SWECOM document here: https://www.computer.org/web/peb/swecom-download &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; The U.S. 2012 Clinger-Cohen Core Competencies and Learning Objectives&amp;lt;/h2&amp;gt;&lt;br /&gt;
The Clinger-Cohen Core Competencies reflect a core body of 12 competency areas identified by the Federal CIO Council of the United States as fundamental to the effective management of federal technology resources:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Policy and Organization&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Leadership and Human Capital Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Process and Change Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Information Resources Strategy and Planning&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; IT Performance Assessment: Models and Methods&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt; IT Project and Program Management&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt; Capital Planning and Investment Control&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt; Acquisition &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Information and Knowledge Management&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Cybersecurity/Information Assurance &amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt; Enterprise Architecture&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;Technology Management and Assessment&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt; Each of the 12 competency areas has several subordinate competencies and all subordinate competencies have associated learning objectives. The competencies document can be linked to via https://cio.gov/cio-council-releases-updated-clinger-cohen-core-competencies-learning-objectives/ .&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	<entry>
		<id>http://eitbokwiki.org/index.php?title=Structuring_the_Enterprise_IT_Organization&amp;diff=1767</id>
		<title>Structuring the Enterprise IT Organization</title>
		<link rel="alternate" type="text/html" href="http://eitbokwiki.org/index.php?title=Structuring_the_Enterprise_IT_Organization&amp;diff=1767"/>
				<updated>2017-03-19T21:26:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jclayton: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;table border=&amp;quot;3&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
    &amp;lt;table&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;60%&amp;quot;&amp;gt;&amp;lt;font color=&amp;quot;#246196&amp;quot;&amp;gt;'''Welcome to the initial version of the EITBOK wiki.  Like all wikis, it is a work in progress and may contain errors.  We welcome feedback, edits, and real-world examples. [[Main_Page#How to Make Comments and Suggestions|Click here]] for instructions about how to send us feedback.''' &amp;lt;/font&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt;[[File:Ieee logo 1.png|100px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td width=&amp;quot;20%&amp;quot;&amp;gt; [[File:Acm_logo_3.png|175px|center]]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Introduction&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;There are a variety of ways to structure the EIT organization. The right one for an organization is one that facilitates cooperation across the various EIT functions, but that makes accountabilities and responsibilities clear.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Early EIT organizations adopted a structure that is still sometimes found today. They divided responsibilities into functions described as Design, Build, Run, or something similar. While it seemed to make sense in concept at the time, it led to silos in real life &amp;amp;mdash; silos with walls between them, hampering communication and therefore effectiveness, as well as leading to finger-pointing across the barriers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Another problem has been how to manage EIT’s relationships with individual users and user departments, while still maintaining the big picture needed for effective portfolio management and funding allocations. This was because primary communications with users were often limited to development activities at the project level and requests coming through the Help Desk. To some extent, the predicament was addressed by the addition of a project management office (PMO), which both housed a set of project managers and was responsible for aggregating project information. However, because these projects were generally only for application development, much of the work of EIT professionals was left out. This has most famously not resolved the issue of 80 percent of EIT spending going to “maintenance” which usually meant unprojectized work going through the Help Desk, but not overseen.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;One approach to solving these problems has been to create ''business relationship groups'' that function in many ways like product managers in technology companies. The business relationship managers provide communication in business language with the user groups and coordinate activities within EIT to support their users. Another approach has been to organize EIT into product lines, where each product line group is responsible for a service (product) from concept to retirement.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;The charts below give some idea of the variety of ways in which EIT has been organized. See if you can guess what sorts of problems these structures would solve and what problems they might create.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Structural Diagrams&amp;lt;/h2&amp;gt;&lt;br /&gt;
[[File:EITOperations.PNG]]&lt;br /&gt;
&amp;lt;p&amp;gt;'''Figure 1. EIT Operations'''&amp;lt;/p&amp;gt;&lt;br /&gt;
[[File:SharedCommunicationServices.PNG]]&lt;br /&gt;
&amp;lt;p&amp;gt;'''Figure 2. EIT Services - Shared Communication Serices'''&amp;lt;/p&amp;gt;&lt;br /&gt;
[[File:CustomerService.PNG]]&lt;br /&gt;
&amp;lt;p&amp;gt;'''Figure 3. CustomerService'''&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jclayton</name></author>	</entry>

	</feed>