Saudi Journal of Engineering and Technology (SJEAT)
Volume-2 | Issue-03 | 140-146
Review Article
IT Security and Risk Management Certifications
Abdulhameed Jastaniyah
Published : March 30, 2017
Abstract
The paper explores IT security and risk management certifications and compares them extensively to
determine the best strategies for securing organization’s information systems from unauthorized modifications and
potential damages. It uses credible websites, such as ISACA and the International Information Systems Security
Certification Consortium (ISC2) website to gather relevant information about their certifications. Furthermore, it relies
on scholarly articles published by ISACA and ISC2 to obtain relevant information regarding cybersecurity and risk
governance authorizations. With this strategy, the document evaluates each certification while listing their respective
security domains and prerequisites. In using both the ISACA and ISC2 accreditation realms, the paper correlates the
leading certifications offered by these associations. It also assesses the data results presented by these IT security
institutions to determine their value to the information system maintenance and safety. Importantly, the document
explains notable security strategies and controls that are listed in both ISACA and ISC2 credentials. With these
approaches, the paper provides ideal security measures and procedures that are in line with specific accreditation to
ensure a comprehensive safety computer system and asset protection. Subsequently, it explains important
recommendations for effective information system support and operations resulting from ISACA and ISC2 accreditations
domains.