Knowledge

Information security management

Source đź“ť

136:
organization's overall information security. This system is typically influenced by an organization's needs, objectives, security requirements, size, and processes. An ISMS includes and lends to risk management and mitigation strategies. Additionally, an organization's adoption of an ISMS indicates that it is systematically identifying, assessing, and managing information security risks and "will be capable of successfully addressing information confidentiality, integrity, and availability requirements." However, the human factors associated with ISMS development, implementation, and practice (the user domain) must also be considered to best ensure the ISMS' ultimate success.
206:. The ISO/IEC 27000 family represents some of the most well-known standards governing information security management and their ISMS is based on global expert opinion. They lay out the requirements for best "establishing, implementing, deploying, monitoring, reviewing, maintaining, updating, and improving information security management systems." ITIL acts as a collection of concepts, policies, and best practices for the effective management of information technology infrastructure, service, and security, differing from ISO/IEC 27001 in only a few ways. COBIT, developed by 122:
Once a threat and/or vulnerability has been identified and assessed as having sufficient impact/likelihood on information assets, a mitigation plan can be enacted. The mitigation method is chosen largely depends on which of the seven information technology (IT) domains the threat and/or vulnerability
82:
Managing information security in essence means managing and mitigating the various threats and vulnerabilities to assets, while at the same time balancing the management effort expended on potential threats and vulnerabilities by gauging the probability of them actually occurring. A meteorite
135:
An information security management system (ISMS) represents the collation of all the interrelated/interacting information security elements of an organization so as to ensure policies, procedures, and objectives can be created, implemented, communicated, and evaluated to better guarantee the
148:
Upper-level management must strongly support information security initiatives, allowing information security officers the opportunity "to obtain the resources necessary to have a fully functional and effective education program" and, by extension, information security management
87:
is certainly a threat, for example, but an information security officer will likely put little effort into preparing for such a threat. Just as people don't have to start preparing for the end of the world just because of the existence of a
210:, is a framework for helping information security personnel develop and implement strategies for information management and governance while minimizing negative impacts and controlling information security and risk management, and 170:
Policies and procedures that are appropriately developed, implemented, communicated, and enforced "mitigate risk and ensure not only risk reduction, but also ongoing compliance with applicable laws, regulations, standards, and
181:
Without sufficient budgetary considerations for all the above—in addition to the money allotted to standard regulatory, IT, privacy, and security issues—an information security management plan/system can not fully succeed.
541: 152:
Information security strategy and training must be integrated into and communicated through departmental strategies to ensure all personnel is positively affected by the organization's information security
123:
resides in. The threat of user apathy toward security policies (the user domain) will require a much different mitigation plan than the one used to limit the threat of unauthorized probing and
46:, a process that involves the assessment of the risks an organization must deal with in the management and protection of assets, as well as the dissemination of the risks to all appropriate 62:, and replacement of assets. As part of information security management, an organization may implement an information security management system and other best practices found in the 167:
Proper evaluation methods for "measuring the overall effectiveness of the training and awareness program" ensure policies, procedures, and training materials remain relevant.
95:
After appropriate asset identification and valuation have occurred, risk management and mitigation of risks to those assets involves the analysis of the following issues:
144:
Implementing an effective information security management (including risk management and mitigation) requires a management strategy that takes note of the following:
548: 599:
Alavi, R.; Islam, S.; Mouratidis, H. (2014). "A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations".
190:
Standards that are available to assist organizations with implementing the appropriate programs and controls to mitigate threats and vulnerabilities include the
573: 108:
and likelihood: The magnitude of potential damage to information assets from threats and vulnerabilities and how serious of a risk they pose to the assets;
739: 227: 815: 712: 203: 618: 232: 393: 102:
Vulnerabilities: How susceptible information assets and associated controls are to exploitation by one or more threats
695: 665: 524: 433: 373: 341: 309: 281: 99:
Threats: Unwanted events that could cause the deliberate or accidental loss, damage, or misuse of information assets
26:) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the 810: 237: 174: 118:: The proposed method(s) for minimizing the impact and likelihood of potential threats and vulnerabilities 164:" can help an organization identify critical gaps in stakeholder knowledge and attitude towards security. 89: 109: 39: 640: 115: 50:. This requires proper asset identification and valuation steps, including evaluating the value of 47: 655: 329: 59: 512: 271: 177:
and timelines for all aspects of information security management help ensure future success.
71: 425:
Practical Information Security Management: A Complete Guide to Planning and Implementation
365:
Practical Information Security Management: A Complete Guide to Planning and Implementation
273:
Practical Information Security Management: A Complete Guide to Planning and Implementation
8: 242: 157: 628: 483: 450: 43: 362:
Campbell, T. (2016). "Chapter 6: Standards, Frameworks, Guidelines, and Legislation".
820: 691: 661: 614: 520: 488: 470: 429: 369: 337: 305: 277: 105: 35: 604: 478: 462: 685: 609: 423: 363: 247: 161: 51: 27: 215: 55: 466: 804: 474: 191: 124: 67: 63: 766:"Open Information Security Management Maturity Model (O-ISM3), Version 2.0" 492: 765: 84: 603:. Lecture Notes in Computer Science. Vol. 8533. pp. 297–305. 394:"IT Security Vulnerability vs Threat vs Risk: What's the Difference?" 139: 218:'s technology-neutral information security model for enterprise. 598: 270:
Campbell, T. (2016). "Chapter 1: Evolution of a Profession".
207: 199: 112:
may also be part of the impact assessment or separate from it
31: 795: 580:. European Union Agency for Network and Information Security 422:
Campbell, T. (2016). "Chapter 4: Organizational Security".
195: 660:. Vol. 3 (6th ed.). CRC Press. pp. 100–02. 740:"What is COBIT? A framework for alignment and governance" 601:
Human Aspects of Information Security, Privacy, and Trust
130: 790: 542:"Information Security Management System (ISMS) Overview" 417: 415: 357: 355: 353: 265: 263: 211: 653: 323: 321: 299: 679: 677: 683: 547:. The Institute of Internal Auditors. Archived from 510: 412: 350: 260: 318: 228:
Certified Information Systems Security Professional
713:"ISO 27001 vs. ITIL: Similarities and differences" 674: 334:Implementing the ISO/IEC 27001:2013 ISMS Standard 77: 16:Controls an organization requires for IT security 802: 519:. Jones & Bartlett Learning. pp. 2–46. 506: 504: 502: 140:Implementation and education strategy components 592: 539: 690:. Jones & Bartlett Learning. p. 225. 448: 387: 385: 295: 293: 499: 327: 687:Fundamentals of Information Systems Security 647: 533: 517:Fundamentals of Information Systems Security 421: 361: 304:(5th ed.). CRC Press. pp. 810–11. 269: 737: 731: 382: 290: 704: 608: 566: 513:"Chapter 1: Information Systems Security" 482: 391: 710: 657:Information Security Management Handbook 449:Lundgren, Björn; Möller, Niklas (2019). 302:Information Security Management Handbook 803: 758: 330:"Chapter 2: ISO/IEC 27001 ISMS Family" 131:Information security management system 127:of a network (the LAN-to-WAN domain). 185: 768:. The Open Group. 21 September 2017 13: 717:The ISO 27001 & ISO 22301 Blog 233:Chief information security officer 14: 832: 816:Information technology management 784: 654:Tipton, H.F.; Krause, M. (2010). 300:Tipton, H.F.; Krause, M. (2003). 70:, and ISO/IEC 27035 standards on 30:, availability, and integrity of 738:White, S.K. (22 December 2017). 336:. Artech House. pp. 11–26. 719:. Advisera Expert Solutions Ltd 684:Kim, D.; Solomon, M.G. (2016). 540:Terroza, A.K.S. (12 May 2015). 511:Kim, D.; Solomon, M.G. (2016). 451:"Defining Information Security" 238:Security information management 20:Information security management 455:Science and Engineering Ethics 442: 78:Risk management and mitigation 1: 253: 610:10.1007/978-3-319-07620-1_26 7: 221: 44:information risk management 42:. The core of ISM includes 10: 837: 578:Threat and Risk Management 428:. APress. pp. 43–61. 392:Watts, S. (21 June 2017). 368:. APress. pp. 71–94. 746:. IDG Communications, Inc 711:Leal, R. (7 March 2016). 574:"Need: The Need for ISMS" 467:10.1007/s11948-017-9992-1 276:. APress. pp. 1–14. 194:family of standards, the 160:training and awareness " 811:Information management 328:Humphreys, E. (2016). 110:cost–benefit analysis 72:information security 400:. BMC Software, Inc 243:Security management 186:Relevant standards 620:978-3-319-07619-5 828: 778: 777: 775: 773: 762: 756: 755: 753: 751: 735: 729: 728: 726: 724: 708: 702: 701: 681: 672: 671: 651: 645: 644: 638: 634: 632: 624: 612: 596: 590: 589: 587: 585: 570: 564: 563: 561: 559: 554:on 7 August 2016 553: 546: 537: 531: 530: 508: 497: 496: 486: 446: 440: 439: 419: 410: 409: 407: 405: 389: 380: 379: 359: 348: 347: 325: 316: 315: 297: 288: 287: 267: 90:global seed bank 83:crashing into a 836: 835: 831: 830: 829: 827: 826: 825: 801: 800: 787: 782: 781: 771: 769: 764: 763: 759: 749: 747: 736: 732: 722: 720: 709: 705: 698: 682: 675: 668: 652: 648: 636: 635: 626: 625: 621: 597: 593: 583: 581: 572: 571: 567: 557: 555: 551: 544: 538: 534: 527: 509: 500: 447: 443: 436: 420: 413: 403: 401: 390: 383: 376: 360: 351: 344: 326: 319: 312: 298: 291: 284: 268: 261: 256: 248:Risk management 224: 200:COBIT framework 188: 162:risk assessment 142: 133: 80: 52:confidentiality 40:vulnerabilities 28:confidentiality 17: 12: 11: 5: 834: 824: 823: 818: 813: 799: 798: 796:The Open Group 793: 786: 785:External links 783: 780: 779: 757: 730: 703: 696: 673: 666: 646: 637:|journal= 619: 591: 565: 532: 525: 498: 461:(2): 419–441. 441: 434: 411: 381: 374: 349: 342: 317: 310: 289: 282: 258: 257: 255: 252: 251: 250: 245: 240: 235: 230: 223: 220: 216:The Open Group 196:ITIL framework 187: 184: 179: 178: 172: 168: 165: 154: 150: 141: 138: 132: 129: 120: 119: 113: 103: 100: 79: 76: 15: 9: 6: 4: 3: 2: 833: 822: 819: 817: 814: 812: 809: 808: 806: 797: 794: 792: 789: 788: 767: 761: 745: 741: 734: 718: 714: 707: 699: 697:9781284128239 693: 689: 688: 680: 678: 669: 667:9781420090956 663: 659: 658: 650: 642: 630: 622: 616: 611: 606: 602: 595: 579: 575: 569: 550: 543: 536: 528: 526:9781284128239 522: 518: 514: 507: 505: 503: 494: 490: 485: 480: 476: 472: 468: 464: 460: 456: 452: 445: 437: 435:9781484216859 431: 427: 426: 418: 416: 399: 395: 388: 386: 377: 375:9781484216859 371: 367: 366: 358: 356: 354: 345: 343:9781608079315 339: 335: 331: 324: 322: 313: 311:9780203325438 307: 303: 296: 294: 285: 283:9781484216859 279: 275: 274: 266: 264: 259: 249: 246: 244: 241: 239: 236: 234: 231: 229: 226: 225: 219: 217: 213: 209: 205: 201: 197: 193: 192:ISO/IEC 27000 183: 176: 173: 169: 166: 163: 159: 155: 151: 147: 146: 145: 137: 128: 126: 117: 114: 111: 107: 104: 101: 98: 97: 96: 93: 91: 86: 75: 73: 69: 68:ISO/IEC 27002 65: 64:ISO/IEC 27001 61: 57: 53: 49: 45: 41: 37: 33: 29: 25: 21: 770:. Retrieved 760: 748:. Retrieved 743: 733: 721:. Retrieved 716: 706: 686: 656: 649: 600: 594: 582:. Retrieved 577: 568: 556:. Retrieved 549:the original 535: 516: 458: 454: 444: 424: 402:. Retrieved 397: 364: 333: 301: 272: 189: 180: 143: 134: 121: 94: 81: 60:availability 48:stakeholders 23: 19: 18: 85:server room 805:Categories 254:References 204:O-ISM3 2.0 175:Milestones 171:policies." 116:Mitigation 639:ignored ( 629:cite book 475:1353-3452 398:BMC Blogs 56:integrity 821:Security 493:29143269 222:See also 125:scanning 772:16 June 750:16 June 723:16 June 584:16 June 558:16 June 484:6450831 404:16 June 214:2.0 is 158:privacy 149:system. 36:threats 694:  664:  617:  523:  491:  481:  473:  432:  372:  340:  308:  280:  212:O-ISM3 202:, and 198:, the 106:Impact 32:assets 791:ISACA 552:(PDF) 545:(PDF) 208:ISACA 153:plan. 34:from 774:2018 752:2018 725:2018 692:ISBN 662:ISBN 641:help 615:ISBN 586:2018 560:2018 521:ISBN 489:PMID 471:ISSN 430:ISBN 406:2018 370:ISBN 338:ISBN 306:ISBN 278:ISBN 38:and 744:CIO 605:doi 479:PMC 463:doi 24:ISM 807:: 742:. 715:. 676:^ 633:: 631:}} 627:{{ 613:. 576:. 515:. 501:^ 487:. 477:. 469:. 459:25 457:. 453:. 414:^ 396:. 384:^ 352:^ 332:. 320:^ 292:^ 262:^ 156:A 92:. 74:. 66:, 58:, 54:, 776:. 754:. 727:. 700:. 670:. 643:) 623:. 607:: 588:. 562:. 529:. 495:. 465:: 438:. 408:. 378:. 346:. 314:. 286:. 22:(

Index

confidentiality
assets
threats
vulnerabilities
information risk management
stakeholders
confidentiality
integrity
availability
ISO/IEC 27001
ISO/IEC 27002
information security
server room
global seed bank
Impact
cost–benefit analysis
Mitigation
scanning
privacy
risk assessment
Milestones
ISO/IEC 27000
ITIL framework
COBIT framework
O-ISM3 2.0
ISACA
O-ISM3
The Open Group
Certified Information Systems Security Professional
Chief information security officer

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑