Running head: New CSO Guideline Name: University: Lecturer: Date: Critique of the New CSO Guideline The new version of the CSO guideline, released on June 2008, looks much better than the previous versions. The presentation of the information is much easier to follow, and there is a more logical flow of ideas from the beginning. It also looks more authoritative, with its broader coverage of all issues related to the CSO position. The amount of details provided are also awesome, considering that every detail so exhibited was the result of a consensus between many people, and hence depicting a high level of deliberation from the creators of the document. Overall, this new version has filled most gaps of knowledge left by the previous versions. However, due to the wide scope covered by the document, there are several things that have not been depicted to a satisfactory level. For one, the high profile position of a CSO is internationally recognized, thus the endeavor to give a blanket recommendation for the salaries and responsibilities within such a short document has resulted in an oversimplification of the intricate roles played by CSO officers world-over.
While it is appreciated that no one document can really cover all case scenarios of security in the entire world, still effort should be made to cover as much of it as possible. The language used for most part of the document, especially the first pages before the breakdown of CSOs responsibilities, looks a bit too technical and way above most untrained people. This is a disadvantage, since the document was supposed to be viewed by both trained security personnel and the untrained public, in order to generate an overall feel of the publics response. Most people in the public, scanning through the document, might feel a bit intimidated by the exotic words sprinkled all over the document. The document does not have a lot of security jargon, but it does use an unusually heavy dose of difficult words. The general layout of the document also needs some working on.
The Essay on Document Object Model 2
Describing the specification differences and browser supports among DOM Level 1, Level 2and Level 3. DOM Level 1 was published in 1998 as a single W3C recommendation, consisting of two modules, the Core and the HTML module. DOM Level 2 was published in late 2000. It introduced the “getElementById” function as well as an event model and support for XML namespaces and CSS. DOM Level 2 ...
The crunched-up arrangement of the words within the pages makes the pages look text heavy, such that reading becomes an exhausting exercise. This situation can be eased off by dwelling more on the essential information about CSO, simplifying the language such that shorter words are used throughout, and making an effort to break the paragraphs into shorter ones. The font used for the document should also be changed to one that is less heavy looking (CSO, 2008).
The salary estimates depicted in the appendix section look okay. The dependence on the region and organization is clearly shown, and it is understandable why some CSO officers would receive higher remunerations than others. And generally, considering the many responsibilities that rest on a CSO, the figures shown are not surprising.
In fact, if anything, there should be an avenue for increasing the figures if a CSO proves especially valiant and innovative (CSO, 2008).
My personal understanding of business acumen is the innate ability to make quick and profitable business decisions. A person who has business acumen can turn a profit in a specific business faster than the average player in the business (Ram, 2008).
I believe that business acumen develops out of experience- as a person faces more challenges and overcomes them, he learns, and if similar situations present themselves in future, they are dealt with swiftly. As time moves on, dealing with challenges and making business decisions becomes an instinctive thing. At that point, the person can be said to have acquired the business acumen. Business acumen is desirable even amongst security managers.
The Essay on How To Achieve Business Information Security In Cyberspace
In the 21st century, a business without a network mirrors a city with no roads. Small businesses, in particular, arguably have a greater need for network connections and information systems. Small businesses rely on information systems for several things, to include their communication and customer database. Small businesses rely on network connectivity for communications. With the advancement in ...
This is because security can also be seen to be a business of sorts: it creates value, which the clients buy at a certain price. The value is the security, and the price is the remuneration for the security personnel. Thus, in order for a security manager, who is the seller of security, to stay in business, he or she should know how to make fast and profitable decisions. For example, he or she should be able to identify the most desirable firms to work for: firms that ideally pay highly while simultaneously exposing the security personnel to minimum risks. References: Ram Charan (2008) Recognizing Business Acumen Retrieved 9th April 2009 from CSO (2008) The New CSO Guideline Retrieved 9th April 2009 from .