SlideShare uma empresa Scribd logo
1 de 11
INSTITUTE OF RURAL MANAGEMENT
SUBMITTED TO – SUBMITTED BY --
Dr. PANKAJ GUPTA URVASHI CHANDALIYA
ADITIYA MISHRA
AJAY BABBAR
Information security management
Information security management
Information security management
describes the set of policies and
procedural controls that IT and
business organizations implement
to secure their informational assets
against threats and vulnerabilities.
Many organizations develop a
formal, documented process for
managing InfoSec ,called an
Information Security Management
System, or ISMS.
Defination -
a) ISM developed in response to increasing enterprise data
collection over the past decade, along with the increasing
threat of cyber attacks and data breaches.
b) Many organizations develop a formal, documented process
for managing InfoSec — often called an Information Security
Management System, or ISMS.
c) Depending on your industry vertical, information security
management might be a legal requirement to safeguard
sensitive information that you collect from customers.
d) Responsibility for information security may be assigned to
a Chief Security Officer, Chief Technical Officer, or to an IT
Operations manager whose team includes IT operators and
security analysts.
What is an informational asset?
Nearly all organizations possess information that they
would not want shared or publicized. Whether these data
are maintained in digital or physical format, the discipline
of Information Security Management is critical to protecting
the data from unauthorized access or theft.
1. Strategic Documentation
2. Products/Service Information
3. Intellectual Property/Patents
4. Proprietary Knowledge/Trade Secrets
5. Employee Data
Informational asset --
Three objectives of information security
management
1. Confidentiality - When it comes to InfoSec, confidentiality and
privacy are essentially the same thing. Preserving the confidentiality
of information means ensuring that only authorized persons can
access or modify the data. Information security management teams
may classify or categorize data based on the perceived risk and
anticipated impact that would result of the data was compromised.
Additional privacy controls can be implemented for higher-risk data.
2. Integrity - Information security management deals
with data integrity by implementing controls that ensure
the consistency and accuracy of stored data throughout
its entire life cycle. For data to be considered secure, the
IT organization must ensure that it is properly stored and
cannot be modified or deleted without the appropriate
permissions. Measures such as version control, user
access controls and check-sums can be implemented to
help maintain data integrity.
3. Availability - Information security management
deals with data availability by implementing processes
and procedures that ensure important information is
available to authorized users when needed. Typical
activities include hardware maintenance and repairs,
installing patches and upgrades, and implementing
incident response and disaster recovery processes to
prevent data loss in the event of a cyber attack
ANY QUESTION….
DR PANKAJ SIR (1).pptx

Mais conteúdo relacionado

Semelhante a DR PANKAJ SIR (1).pptx

Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxBluechip Gulf IT Services
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Editor IJCATR
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 

Semelhante a DR PANKAJ SIR (1).pptx (20)

Information security
Information securityInformation security
Information security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptx
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
Information Security
Information SecurityInformation Security
Information Security
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 

Mais de AdityaMishra105898

Navigating the E-learning Ecosystem.pptx
Navigating the E-learning Ecosystem.pptxNavigating the E-learning Ecosystem.pptx
Navigating the E-learning Ecosystem.pptxAdityaMishra105898
 
GIG ECONOMY PRESENTATION-1.pptx
GIG ECONOMY PRESENTATION-1.pptxGIG ECONOMY PRESENTATION-1.pptx
GIG ECONOMY PRESENTATION-1.pptxAdityaMishra105898
 
Porter’s five forces model.pptx
Porter’s five forces model.pptxPorter’s five forces model.pptx
Porter’s five forces model.pptxAdityaMishra105898
 
Presentation on Line and Staff Functions.pptx
Presentation on Line and Staff Functions.pptxPresentation on Line and Staff Functions.pptx
Presentation on Line and Staff Functions.pptxAdityaMishra105898
 
Digital agriculture for Atmanirbhar Bharat.pdf
Digital agriculture for Atmanirbhar Bharat.pdfDigital agriculture for Atmanirbhar Bharat.pdf
Digital agriculture for Atmanirbhar Bharat.pdfAdityaMishra105898
 
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptx
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptxICT And Indian Agriculture - Opportunities and Challenges 16112022.pptx
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptxAdityaMishra105898
 

Mais de AdityaMishra105898 (12)

MSP_Aditya.pptx
MSP_Aditya.pptxMSP_Aditya.pptx
MSP_Aditya.pptx
 
Navigating the E-learning Ecosystem.pptx
Navigating the E-learning Ecosystem.pptxNavigating the E-learning Ecosystem.pptx
Navigating the E-learning Ecosystem.pptx
 
GIG ECONOMY PRESENTATION-1.pptx
GIG ECONOMY PRESENTATION-1.pptxGIG ECONOMY PRESENTATION-1.pptx
GIG ECONOMY PRESENTATION-1.pptx
 
ANKITA MAAM PPT.pptx
ANKITA MAAM PPT.pptxANKITA MAAM PPT.pptx
ANKITA MAAM PPT.pptx
 
organic_farmig ppt.ppt
organic_farmig ppt.pptorganic_farmig ppt.ppt
organic_farmig ppt.ppt
 
RMM 1.pptx
RMM 1.pptxRMM 1.pptx
RMM 1.pptx
 
Porter’s five forces model.pptx
Porter’s five forces model.pptxPorter’s five forces model.pptx
Porter’s five forces model.pptx
 
Presentation on Line and Staff Functions.pptx
Presentation on Line and Staff Functions.pptxPresentation on Line and Staff Functions.pptx
Presentation on Line and Staff Functions.pptx
 
SIP ppt - Jeremy (1) (2).pptx
SIP ppt - Jeremy (1) (2).pptxSIP ppt - Jeremy (1) (2).pptx
SIP ppt - Jeremy (1) (2).pptx
 
Digital agriculture for Atmanirbhar Bharat.pdf
Digital agriculture for Atmanirbhar Bharat.pdfDigital agriculture for Atmanirbhar Bharat.pdf
Digital agriculture for Atmanirbhar Bharat.pdf
 
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptx
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptxICT And Indian Agriculture - Opportunities and Challenges 16112022.pptx
ICT And Indian Agriculture - Opportunities and Challenges 16112022.pptx
 
Mashroom compost-English.pptx
Mashroom compost-English.pptxMashroom compost-English.pptx
Mashroom compost-English.pptx
 

Último

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 

Último (20)

MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

DR PANKAJ SIR (1).pptx

  • 1. INSTITUTE OF RURAL MANAGEMENT SUBMITTED TO – SUBMITTED BY -- Dr. PANKAJ GUPTA URVASHI CHANDALIYA ADITIYA MISHRA AJAY BABBAR
  • 3. Information security management describes the set of policies and procedural controls that IT and business organizations implement to secure their informational assets against threats and vulnerabilities. Many organizations develop a formal, documented process for managing InfoSec ,called an Information Security Management System, or ISMS. Defination -
  • 4. a) ISM developed in response to increasing enterprise data collection over the past decade, along with the increasing threat of cyber attacks and data breaches. b) Many organizations develop a formal, documented process for managing InfoSec — often called an Information Security Management System, or ISMS. c) Depending on your industry vertical, information security management might be a legal requirement to safeguard sensitive information that you collect from customers. d) Responsibility for information security may be assigned to a Chief Security Officer, Chief Technical Officer, or to an IT Operations manager whose team includes IT operators and security analysts.
  • 5. What is an informational asset? Nearly all organizations possess information that they would not want shared or publicized. Whether these data are maintained in digital or physical format, the discipline of Information Security Management is critical to protecting the data from unauthorized access or theft.
  • 6. 1. Strategic Documentation 2. Products/Service Information 3. Intellectual Property/Patents 4. Proprietary Knowledge/Trade Secrets 5. Employee Data Informational asset --
  • 7. Three objectives of information security management 1. Confidentiality - When it comes to InfoSec, confidentiality and privacy are essentially the same thing. Preserving the confidentiality of information means ensuring that only authorized persons can access or modify the data. Information security management teams may classify or categorize data based on the perceived risk and anticipated impact that would result of the data was compromised. Additional privacy controls can be implemented for higher-risk data.
  • 8. 2. Integrity - Information security management deals with data integrity by implementing controls that ensure the consistency and accuracy of stored data throughout its entire life cycle. For data to be considered secure, the IT organization must ensure that it is properly stored and cannot be modified or deleted without the appropriate permissions. Measures such as version control, user access controls and check-sums can be implemented to help maintain data integrity.
  • 9. 3. Availability - Information security management deals with data availability by implementing processes and procedures that ensure important information is available to authorized users when needed. Typical activities include hardware maintenance and repairs, installing patches and upgrades, and implementing incident response and disaster recovery processes to prevent data loss in the event of a cyber attack