Jump to content

Information security management: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
No edit summary
Line 9: Line 9:
* ''Impact'': The magnitude of the potential loss or the seriousness of the event.
* ''Impact'': The magnitude of the potential loss or the seriousness of the event.


Standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/[[ISO 27000]], [[Information Technology Infrastructure Library]], [[Open Information Security Management Maturity Model|O-ISM3]] and [[COBIT]].
Standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/[[ISO 27000]], [[Information Technology Infrastructure Library]], [[Open Information Security Maturity Model|O-ISM3]] and [[COBIT]].


== See also ==
== See also ==

Revision as of 20:23, 17 February 2017

Information security (InfoSec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage.

Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.

The risks to these assets can be calculated by analysis of the following issues:

  • Threats to your assets: These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets
  • Vulnerabilities: How susceptible your assets are to attack
  • Impact: The magnitude of the potential loss or the seriousness of the event.

Standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/ISO 27000, Information Technology Infrastructure Library, O-ISM3 and COBIT.

See also