Password Protected
Nope
Yep, that's right!
Career Guidance Knowledge information and communication technologies (icts) K061 - information and communication technologies (icts) K0612 - database and network design and administration Information security strategy
Description
The plan defined by a company which sets the information security objectives and measures to mitigate risks, define control objectives, establish metrics and benchmarks while complying with legal, internal and contractual requirements.
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 3 occupations
- Optional in 8 occupations
- Total: 11 occupations
- Most common in: ISCO major group 2 (Professionals)
Essential for
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- ICT information and knowledge managerICT information and knowledge managers contribute to the definition of organisational information strategy and apply information and knowledge creation, editing, storage, and distr…
- ICT network engineerICT network engineers implement, maintain and support computer networks. They also perform network modelling, analysis, and planning. They may also design network and computer secu…
Optional for
- ICT security administratorICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
- Integration engineerIntegration engineers develop and implement solutions which coordinate applications across the enterprise or its units and departments. They evaluate existing components or systems…
- Digital forensics expertDigital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
- ICT disaster recovery analystICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, d…
- ICT system administratorICT system administrators are responsible for the upkeep, configuration, and reliable operation of computer and network systems, servers, workstations and peripheral devices. They …
- IT auditorIT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. The…
- WebmasterWebmasters deploy, maintain, monitor and support a web server to meet service requirements. They ensure optimum system integrity, security, backup and performance. They coordinate …
- Chief data officerChief data officers manage companies' enterprise-wide data administration and data mining functions. They ensure data are used as a strategic business asset at the executive level …
Related skills
- ICT infrastructure
- Cyber security
- Manage IT security compliances
- Use scripting programming
- Information confidentiality
- Implement a virtual private network
- ICT network security risks
- Implement a firewall
- Cloud technologies
- Cyber attack counter-measures
- ICT debugging tools
- Information architecture
Last updated on February 18, 2026
