Information Security Management

Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.

The risks to these assets can be calculated by analysis of the following issues:

  • Threats to your assets. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets
  • Vulnerabilities. How susceptible your assets are to attack
  • Impact. The magnitude of the potential loss or the seriousness of the event.

Standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/ISO 17799, Information Technology Infrastructure Library and COBIT.

Famous quotes containing the words information, security and/or management:

    English literature is a kind of training in social ethics.... English trains you to handle a body of information in a way that is conducive to action.
    Marilyn Butler (b. 1937)

    Modern children were considerably less innocent than parents and the larger society supposed, and postmodern children are less competent than their parents and the society as a whole would like to believe. . . . The perception of childhood competence has shifted much of the responsibility for child protection and security from parents and society to children themselves.
    David Elkind (20th century)

    People have described me as a “management bishop” but I say to my critics, “Jesus was a management expert too.”
    George Carey (b. 1935)