Jump to content

Information security management: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Cleared the cite-error - restored a category + {{wikify}}
Line 1: Line 1:
{{Unreferenced|date=December 2008}}
{{Unreferenced|date=December 2008}}[[Information security]] (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. '''Information security management''' (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.
{{Wikify|date=November 2011}}
[[Information security]] (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. '''Information security management''' (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.


The risks to these assets can be calculated by analysis of the following issues:
The risks to these assets can be calculated by analysis of the following issues:


* ''Threats to your assets''. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets
* ''Threats to your assets''. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets

* ''Vulnerabilities''. How susceptible your assets are to attack
* ''Vulnerabilities''. How susceptible your assets are to attack

* ''Impact''. The magnitude of the potential loss or the seriousness of the event.
* ''Impact''. The magnitude of the potential loss or the seriousness of the event.


Line 18: Line 18:


• Availability– Authorised users have access to information when required.
• Availability– Authorised users have access to information when required.


==C I A==
==C I A==
Line 31: Line 30:
High availability
High availability
Quality of information
Quality of information



==Security Management Function Overview==
==Security Management Function Overview==


Mission Statement
Mission Statement
To prevent the occurrence of security-related incidents by managing the cconfidentiality, integrity and availability of IT services and data line with business requirements at acceptable cost.
To prevent the occurrence of security-related incidents by managing the cconfidentiality, integrity and availability of IT services and data line with business requirements at acceptable cost.



Function Goal
Function Goal
Line 51: Line 46:
• Periodic auditing of security practices to continually improve overall security functions and controls
• Periodic auditing of security practices to continually improve overall security functions and controls
• Effective security controls that are in line with business and regulatory requirements at acceptable cost levels
• Effective security controls that are in line with business and regulatory requirements at acceptable cost levels



==Critical Success Factors (CSFs)==
==Critical Success Factors (CSFs)==
Line 58: Line 52:
• Providing Security Cost Effectively
• Providing Security Cost Effectively
• Proactively Addressing Security Improvements Where Needed
• Proactively Addressing Security Improvements Where Needed



==Key Activities==
==Key Activities==
Line 68: Line 61:
• Maintain Security Management people, processes and technical infrastructure
• Maintain Security Management people, processes and technical infrastructure
• Provide management information about Security Management quality and operations
• Provide management information about Security Management quality and operations



==Key Performance Indicators (KPIs)==
==Key Performance Indicators (KPIs)==
Line 78: Line 70:
• Number of incidents caused by external security failures
• Number of incidents caused by external security failures
• Number of security audit and testing failures
• Number of security audit and testing failures



==Providing Security Cost Effectively==
==Providing Security Cost Effectively==
Line 84: Line 75:
• Percentage of delivery cost per customer related to security management activities
• Percentage of delivery cost per customer related to security management activities
• Percentage of delivery cost per customer related to security measures implemented
• Percentage of delivery cost per customer related to security measures implemented



==Proactively Addressing Security Improvements Where Needed==
==Proactively Addressing Security Improvements Where Needed==
Line 92: Line 82:
• Number of Security Improvement Initiatives not yet staffed/started
• Number of Security Improvement Initiatives not yet staffed/started
• Number of Security incidents related to non-current security maintenance.<ref>Reference 1</ref>
• Number of Security incidents related to non-current security maintenance.<ref>Reference 1</ref>





==Information processing facility==
==Information processing facility==
Line 102: Line 89:
it can be either tangible or intangible.
it can be either tangible or intangible.


==Information security==
==Information security==
Information security is all about protecting and preserving
Information security is all about protecting and preserving
Line 109: Line 95:
reliability of information.
reliability of information.


==Information security event==
==Information security event==
An information security event indicates that the security of
An information security event indicates that the security of
Line 117: Line 102:
been violated or a safeguard may have failed.
been violated or a safeguard may have failed.


==Information security incident==
==Information security incident==
An information security incident is made up of one or more
An information security incident is made up of one or more
Line 124: Line 108:
and weaken or impair your business operations.
and weaken or impair your business operations.



==Information security management system (ISMS)==
==Information security management system (ISMS)==
An information security management system (ISMS) includes
An information security management system (ISMS) includes
Line 135: Line 117:
part of a larger management system.
part of a larger management system.


==Information security policy==
==Information security policy==
An information security policy statement expresses
An information security policy statement expresses
Line 156: Line 137:


== References==
== References==
{{reflist}}
*1. IT Library [http://www.itlibrary.org/IT_Security_Management]
* [http://www.itlibrary.org/IT_Security_Management IT Library]
*2. ISO 27001 AND ISO 27002 PLAIN ENGLISH DEFINITIONS [http://www.praxiom.com/iso-27001-definitions.htm] 2005.
* [http://www.praxiom.com/iso-27001-definitions.htm ISO 27001 AND ISO 27002 PLAIN ENGLISH DEFINITIONS] 2005.
*3. What is Security Information Management [http://www.webopedia.com/TERM/S/security_information_management.html] 2011.
* [http://www.webopedia.com/TERM/S/security_information_management.html What is Security Information Management] 2011.


== External links ==
== External links ==
* [http://www.isaca.org/ ISACA]
* [http://www.isaca.org/ ISACA]

[[Category:Security]]

Revision as of 01:47, 29 November 2011

Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.

The risks to these assets can be calculated by analysis of the following issues:

  • Threats to your assets. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets
  • Vulnerabilities. How susceptible your assets are to attack
  • Impact. The magnitude of the potential loss or the seriousness of the event.

Also,standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/ISO 17799, Information Technology Infrastructure Library and COBIT.According to BS 7799, Information Security refers to maintaining:

• Confidentiality - Information is accessible only to those authorized.


• Integrity- Safeguarding the accuracy and completeness of information


• Availability– Authorised users have access to information when required.

C I A

Objectives:

To ensure that it complies with the external requirements-legislation SLA’s etc. To create a secure environment regardless of the external requirements Benefits:

Vital Business Information is kept secure High availability Quality of information

Security Management Function Overview

Mission Statement To prevent the occurrence of security-related incidents by managing the cconfidentiality, integrity and availability of IT services and data line with business requirements at acceptable cost.

Function Goal Prevent security related incidents by establishing: Achieve the function mission by implementing: • ITIL-aligned Security Management function • Dedicated Security Management Function Owner • Holistic management view of security considering people, process and physical items as well as technical items • Centralized function for managing security and establishing security related policies • Ongoing monitoring and reporting of security • Proactive actions to prevent security related incidents • Periodic auditing of security practices to continually improve overall security functions and controls • Effective security controls that are in line with business and regulatory requirements at acceptable cost levels

Critical Success Factors (CSFs)

The Critical Success Factors (CSFs) are: • Managing Confidentiality, Integrity and Availability Of IT Services And Data • Providing Security Cost Effectively • Proactively Addressing Security Improvements Where Needed

Key Activities

The key activities for this function are: • Plan for Security Management in line with service and policy requirements • Coordinate implementation of Security Management people, process and technologies • Execute Security Management control activities • Evaluate and audit the Security Management supporting infrastructure • Maintain Security Management people, processes and technical infrastructure • Provide management information about Security Management quality and operations

Key Performance Indicators (KPIs)

Examples of Key Process Performance Indicators (KPIs) are shown in the list below. Each one is mapped to a Critical Success Factor (CSF).

Managing the Confidentiality, Integrity and Availability of IT Services and Data

• Number of incidents caused by internal security failures • Number of incidents caused by external security failures • Number of security audit and testing failures

Providing Security Cost Effectively

• Percentage of delivery cost per customer related to security management activities • Percentage of delivery cost per customer related to security measures implemented

Proactively Addressing Security Improvements Where Needed

• Number of Security Improvement Initiatives in place. • Number of Security Improvement Initiatives completed on time • Number of Security Improvement Initiatives not yet staffed/started • Number of Security incidents related to non-current security maintenance.[1]

Information processing facility

An information processing facility is defined as any system, service, or infrastructure, or any physical location that houses these things. A facility can be either an activity or a place; it can be either tangible or intangible.

Information security

Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Information security event

An information security event indicates that the security of an information system, service, or network may have been breached or compromised. An information security event indicates that an information security policy may have been violated or a safeguard may have failed.

Information security incident

An information security incident is made up of one or more unwanted or unexpected information security events that could very likely compromise the security of your information and weaken or impair your business operations.

Information security management system (ISMS)

An information security management system (ISMS) includes all of the policies, procedures, plans, processes, practices, roles, responsibilities, resources, and structures that are used to protect and preserve information. It includes all of the elements that organizations use to manage and control their information security risks. An ISMS is part of a larger management system.

Information security policy

An information security policy statement expresses management’s commitment to the implementation, maintenance, and improvement of its information security management system..[2]

Security Information Management

Short for security information management, a type of software that automates the collection of event log data from security devices, such as such as firewalls, proxy servers, intrusion-detection systems and antivirus software. The SIM translates the logged data into correlated and simplified formats.[3]

See also

References