Global Information Lookup Global Information

Organizational Systems Security Analyst information


The Organizational Systems Security Analyst (OSSA) is a technical vendor-neutral Information Security certification programme which is being offered in Asia. It is developed by ThinkSECURE Pte Ltd, an information-security certification body and consultancy. The programme consists of a specialized technical information security training and certification course and practical examination which technical Information Technology professionals can attend in order to become skilled and effective technical Information Security professionals and to prove their level of competence and skill by undergoing the examination.

Technical staff enrolling in the programme are taught and trained how to address the technical security issues they encounter in daily operations and how to methodically establish, operate and maintain security for their organization's computer network and computer systems infrastructure.

The OSSA programme does not focus on hackers' software as these quickly become obsolete as software patches are released. It first looks at security from a methodological thinking perspective and draws lessons from Sun Tzu's "The Art of War" to generate a security framework and then introduces example resources and tools by which the various security aims and objectives, such as "how to defend your server against a hacker's attacks" can be met.

Sun Tzu's 'Art of War' treatise is used to provide a guiding philosophy throughout the programme, addressing both offensive threats and the defensive measures needed to overcome them. The philosophy also extends to the sections on incident response methodology (i.e. how to respond to security breaches), computer forensics and the impact of law on security-related activities such as the recovery of information from a computer crime suspect's hard drive. Under the programme, students are given coursework and experience how to set up and maintain a complete enterprise-class security monitoring and defence infrastructure which includes firewalls, network intrusion detection systems, file-integrity checkers, honeypots and encryption. A unique attacker's methodology is also introduced to assist the technical staff with identifying the modus operandi of an attacker and his arsenal and to conduct auditing against computer systems by using that methodology.

The generic title sections under the programme appear to comprise the following:

  • What is Information Security
  • Network 101
  • Defending your Turf & Security Policy Formulation
  • Defensive Tools & Lockdown
  • The 5E Attacker Methodology: Attacker Methods & Exploits
  • Wireless (In)Security
  • Incident Response & Computer Forensics
  • The Impact Of Law

Under each section are many modules, for example the defensive section covers the setting up of firewalls, NIDS, HIDS, honeypots, cryptographic software, etc.

The OSSA programme consists of both practical hands-on lab-based coursework and a practical hands-on lab-based certification examination. According to the ThinkSECURE website, the rationale for this is that only those who prove they can apply their skills and knowledge to a completely new and unknown exam setup will get certified and those who only know how to do exam-cramming by memorizing facts and figures and visiting brain dump sites will not be able to get certified. Compared to non-practical multiple-choice-question exam formats, this method of examination is beneficial for the Information Security industry and employers as a whole because it provides the following benefits:

  • makes sure only candidates who can prove ability to apply skills in a practical examination are certified.
  • stops brain-dumpers from attaining and devaluing the certification as a basis of competency evaluation.
  • protects people's and companies' money and time investment in getting certified.
  • helps employers identify technical staff who are more skilled.
  • provides the industry with a pool of competent, qualified technical staff.

and 29 Related for: Organizational Systems Security Analyst information

Request time (Page generated in 0.8457 seconds.)

Organizational Systems Security Analyst

Last Update:

The Organizational Systems Security Analyst (OSSA) is a technical vendor-neutral Information Security certification programme which is being offered in...

Word Count : 605

OSSA

Last Update:

Adviser on Africa, a United Nations initiative Organizational Systems Security Analyst, an information security certification Star of South Africa, Officer...

Word Count : 77

Information security

Last Update:

themselves as part of the organization Information Security "effort" and often take actions that ignore organizational information security best interests. Research...

Word Count : 22122

Computer security

Last Update:

Computer security, cybersecurity, digital security, or information technology security (IT security) is the protection of computer systems and networks...

Word Count : 22101

System administrator

Last Update:

System administrators, in larger organizations, tend not to be systems architects, systems engineers, or systems designers. In smaller organizations,...

Word Count : 1309

Security information and event management

Last Update:

so has the event and log generation on these systems. In comparison, the logging of system, security, and application logs is not the only way to perform...

Word Count : 4095

Security operations center

Last Update:

security operations center (SOC) is responsible for protecting an organization against cyber threats. SOC analysts perform round-the-clock monitoring...

Word Count : 395

Committee on National Security Systems

Last Update:

National Security Systems (CNSS) is a United States intergovernmental organization that sets policies for the security of the US security systems. The CIA...

Word Count : 379

Middleware analyst

Last Update:

technologies used by Middleware analysts sit "in-the-middle", between two or more systems; the purpose being to enable two systems to communicate and share information...

Word Count : 1305

Information security operations center

Last Update:

aware of current events which may affect information systems. A security engineer or security analyst may have several computer monitors on their desk. Processes...

Word Count : 1098

Global Information Assurance Certification

Last Update:

Certified Unix System Administrator | Cybersecurity Certification". www.giac.org. Retrieved 2020-08-11. "GIAC Certified Perimeter Protection Analyst | GPPA Certification"...

Word Count : 404

Organizational structure

Last Update:

supervision are directed toward the achievement of organizational aims. Organizational structure affects organizational action and provides the foundation on which...

Word Count : 6304

Functional requirement

Last Update:

In software engineering and systems engineering, a functional requirement defines a function of a system or its component, where a function is described...

Word Count : 677

GIS in geospatial intelligence

Last Update:

Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies...

Word Count : 2582

Information system

Last Update:

An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical...

Word Count : 5872

Chief information security officer

Last Update:

heterogeneous teams of information security managers, directors of information security, security analysts, security engineers and technology risk managers...

Word Count : 1157

List of computer security certifications

Last Update:

2018-07-24. "IT Security Certification | SSCP - Systems Security Certified Practitioner | (ISC)2". www.isc2.org. Retrieved 2018-07-24. "Cloud Security Certifications:...

Word Count : 872

Cyber threat hunting

Last Update:

Threat hunting has traditionally been a manual process, in which a security analyst sifts through various data information using their own knowledge and...

Word Count : 1130

United Nations Department for Safety and Security

Last Update:

Safety Management System. UNDSS reports directly to the Secretary-General. The UNDSS manages a network of security advisers, analysts, officers and coordinators...

Word Count : 1641

Federal Security Service

Last Update:

the chiefs of six departments: Economic Security Department, Counterintelligence Department, Organizational and Personnel Service, Department of activity...

Word Count : 9630

Intelligence analysis

Last Update:

Center for Intelligence and Security Studies – trains new analysts in intelligence analysis Intelligence analysis organizations Hayes, Joseph (2007), "Analytic...

Word Count : 8610

Threat Intelligence Platform

Last Update:

correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management...

Word Count : 1490

Information technology management

Last Update:

support of organizational strategic goals. IT Managers need to know predominantly Technical and Managerial skills such as analyst of computer systems , information...

Word Count : 1060

Organizational structure of the Central Intelligence Agency

Last Update:

Digital Identity and Security Embedded Systems and Power In January 2008, its featured collaboration was with Streambase Systems, makers of a "high-performance...

Word Count : 6034

Business analysis

Last Update:

within an organization is called a business analyst or BA. Business analysts are not found solely within projects for developing software systems. They may...

Word Count : 3724

National Security Agency

Last Update:

Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing. The Information Systems Security Directorate,...

Word Count : 22341

Cisco

Last Update:

Protocol Cisco Security Agent Cisco Systems VPN Client Cisco WebEx Cisco Field "Contact Cisco". Retrieved March 1, 2017. "Cisco Systems, Inc. Fiscal 2023...

Word Count : 9258

United States Space Force

Last Update:

Intelligence Analysts (5I0), Geospatial Intelligence Analysts (5I1), Signals Intelligence Analysts (5I2), and Fusion Analysts (5I4), and Targeting Analysts (5I8)...

Word Count : 13341

Legacy system

Last Update:

legacy systems in space exploration at the Technical University of Munich. According to Hein, legacy systems are attractive for reuse if an organization has...

Word Count : 3087

PDF Search Engine © AllGlobal.net