Download presentation
Presentation is loading. Please wait.
Published byDenis Webb Modified over 9 years ago
1
Security Management https://store.theartofservice.com/the-security-management-toolkit.html
2
IT risk management - Organization for security management 1 The set up of the organization in charge of risk management is foreseen as partially fulfilling the requirement to provide the resources needed to establish, implement, operate, monitor, review, maintain and improve an ISMS. The main roles inside this organization are: https://store.theartofservice.com/the-security-management-toolkit.html
3
IT risk management - Organization for security management 1 the business and functional managers https://store.theartofservice.com/the-security-management-toolkit.html
4
IT risk management - Organization for security management 1 the Information System Security Officer (ISSO) or Chief information security officer (CISO) https://store.theartofservice.com/the-security-management-toolkit.html
5
IT risk management - Organization for security management 1 IT Security Practitioners https://store.theartofservice.com/the-security-management-toolkit.html
6
Information Technology Infrastructure Library - Information security management system 1 The ITIL-process Security Management describes the structured fitting of information security in the management organization. ITIL security management is based on the code of practice for information security management system (ISMS) now known as ISO/IEC 27002. https://store.theartofservice.com/the-security-management-toolkit.html
7
Information Technology Infrastructure Library - Information security management system 1 A basic goal of security management is to ensure adequate information security. The primary goal of information security, in turn, is to protect information assets against risks, and thus to maintain their value to the organization. This is commonly expressed in terms of ensuring their confidentiality, integrity and availability, along with related properties or goals such as authenticity, accountability, non-repudiation and reliability. https://store.theartofservice.com/the-security-management-toolkit.html
8
Information Technology Infrastructure Library - Information security management system 1 Mounting pressure for many organizations to structure their information security management systems in accordance with ISO/IEC 27001 requires revision of the ITIL v2 security management volume, which culminated in the release of the 2007 edition. https://store.theartofservice.com/the-security-management-toolkit.html
9
Network security - Security management 1 Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. https://store.theartofservice.com/the-security-management-toolkit.html
10
Business continuity - Security management 1 In today's global business environment, security must be the top priority in managing Information Technology. For most organizations, security is mandated by law, and conformance to those mandates is investigated regularly in the form of audits. Failure to pass security audits can have financial and management changing impacts upon an organization. https://store.theartofservice.com/the-security-management-toolkit.html
11
Security - Security management in organizations 1 In the corporate world, various aspects of security were historically addressed separately - notably by distinct and often noncommunicating departments for IT security, physical security, and fraud prevention. Today there is a greater recognition of the interconnected nature of security requirements, an approach variously known as holistic security, "all hazards" management, and other terms. https://store.theartofservice.com/the-security-management-toolkit.html
12
Security - Security management in organizations 1 Inciting factors in the convergence of security disciplines include the development of digital video surveillance technologies (see Professional video over IP) and the digitization and networking of physical control systems (see SCADA) https://store.theartofservice.com/the-security-management-toolkit.html
13
Security - Security management in organizations 1 Although the title supply chain is included, this Standard specifies the requirements for a security management system, including those aspects critical to security assurance for any organisation or enterprise wishing to management the security of the organisation and its activities https://store.theartofservice.com/the-security-management-toolkit.html
14
Information security management 1 Information security management https://store.theartofservice.com/the-security-management-toolkit.html
15
Information security management 1 Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks. https://store.theartofservice.com/the-security-management-toolkit.html
16
Information security management 1 The risks to these assets can be calculated by analysis of the following issues: https://store.theartofservice.com/the-security-management-toolkit.html
17
Information security management 1 Threats to your assets. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets https://store.theartofservice.com/the-security-management-toolkit.html
18
Information security management 1 Vulnerabilities. How susceptible your assets are to attack https://store.theartofservice.com/the-security-management-toolkit.html
19
Information security management 1 Impact. The magnitude of the potential loss or the seriousness of the event. https://store.theartofservice.com/the-security-management-toolkit.html
20
Information security management 1 Standards that are available to assist organizations implement the appropriate programmes and controls to mitigate these risks are for example BS7799/ISO 17799, Information Technology Infrastructure Library and COBIT. https://store.theartofservice.com/the-security-management-toolkit.html
21
ITIL security management 1 The ITIL security management process describes the structured fitting of security in the management organization. https://store.theartofservice.com/the-security-management-toolkit.html
22
ITIL security management 1 ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. https://store.theartofservice.com/the-security-management-toolkit.html
23
ITIL security management 1 It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. https://store.theartofservice.com/the-security-management-toolkit.html
24
ITIL security management 1 ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties." https://store.theartofservice.com/the-security-management-toolkit.html
25
ITIL security management 1 A basic concept of security management is the information security. https://store.theartofservice.com/the-security-management-toolkit.html
26
ITIL security management 1 The primary goal of information security is to guarantee safety of information. When protecting information it is the value of the information that must be protected. https://store.theartofservice.com/the-security-management-toolkit.html
27
ITIL security management 1 These values are stipulated by the confidentiality, integrity and availability. https://store.theartofservice.com/the-security-management-toolkit.html
28
ITIL security management 1 The goal of the Security Management is split up in two parts: https://store.theartofservice.com/the-security-management-toolkit.html
29
ITIL security management 1 The realization of the security requirements defined in the service level agreement (SLA) and other external requirements which are specified in underpinning contracts, legislation and possible internal or external imposed policies. https://store.theartofservice.com/the-security-management-toolkit.html
30
ITIL security management 1 The realization of a basic level of security. https://store.theartofservice.com/the-security-management-toolkit.html
31
ITIL security management 1 This is necessary to guarantee the continuity of the management organization. https://store.theartofservice.com/the-security-management-toolkit.html
32
ITIL security management 1 This is also necessary in order to reach a simplified service-level management for the information security, as it happens to be easier to manage a limited number of SLAs than it is to manage a large number of SLAs. https://store.theartofservice.com/the-security-management-toolkit.html
33
ITIL security management 1 The input of the security management process is formed by the SLAs with the specified security requirements, legislation documents (if applicable) and other (external) underpinning contracts. https://store.theartofservice.com/the-security-management-toolkit.html
34
ITIL security management 1 These requirements can also act as key performance indicators (KPIs) which can be used for the process management and for the justification of the results of the security management process. https://store.theartofservice.com/the-security-management-toolkit.html
35
ITIL security management 1 The output gives justification information to the realization of the SLAs and a report with deviations from the requirements. https://store.theartofservice.com/the-security-management-toolkit.html
36
ITIL security management 1 The security management process has relations with almost all other ITIL-processes. https://store.theartofservice.com/the-security-management-toolkit.html
37
ITIL security management 1 However, in this particular section the most obvious relations will be the relations to the service level management process, the incident management process and the Change Management process. https://store.theartofservice.com/the-security-management-toolkit.html
38
ITIL security management - The security management process 1 The security management process consists of activities that are carried out by the security management itself or activities that are controlled by the security management. https://store.theartofservice.com/the-security-management-toolkit.html
39
ITIL security management - The security management process 1 Because organizations and their information systems constantly change, the activities within the security management process must be revised continuously, in order to stay up-to-date and effective. Security management is a continuous process and it can be compared to W. Edwards Deming's Quality Circle (Plan, Do, Check, Act). https://store.theartofservice.com/the-security-management-toolkit.html
40
ITIL security management - The security management process 1 The inputs are the requirements which are formed by the clients https://store.theartofservice.com/the-security-management-toolkit.html
41
ITIL security management - The security management process 1 The activities, results/products and the process are documented. External reports are written and sent to the clients. The clients are then able to adapt their requirements based on the information received through the reports. Furthermore, the service provider can adjust their plan or the implementation based on their findings in order to satisfy all the requirements stated in the SLA (including new requirements). https://store.theartofservice.com/the-security-management-toolkit.html
42
ITIL security management - Control 1 The first activity in the security management process is the “Control” sub- process. The Control sub-process organizes and manages the security management process itself. The Control sub-process defines the processes, the allocation of responsibility the policy statements and the management framework. https://store.theartofservice.com/the-security-management-toolkit.html
43
ITIL security management - Control 1 The security management framework defines the sub-processes for: the development of security plans, the implementation of the security plans, the evaluation and how the results of the evaluations are translated into action plans. Furthermore, the management framework defines how should be reported to clients. https://store.theartofservice.com/the-security-management-toolkit.html
44
ITIL security management - Control 1 The activities that take place in the Control process are summed up in the following table, which contains the name of the (sub) activity and a short definition of the activity. https://store.theartofservice.com/the-security-management-toolkit.html
45
ITIL security management - Control 1 ActivitiesSub- ActivitiesDescriptions https://store.theartofservice.com/the-security-management-toolkit.html
46
ITIL security management - Control 1 ControlImplement policiesThis process outlines the specific requirements and rules that have to be met in order to implement security management. The process ends with policy statement. https://store.theartofservice.com/the-security-management-toolkit.html
47
ITIL security management - Control 1 Setup the security organizationThis process sets up the organizations for information security. For example in this process the structure the responsibilities are set up. This process ends with security management framework. https://store.theartofservice.com/the-security-management-toolkit.html
48
ITIL security management - Control 1 ReportingIn this process the whole targeting process is documented in a specific way. This process ends with reports. https://store.theartofservice.com/the-security-management-toolkit.html
49
ITIL security management - Control 1 The meta-modeling technique was used in order to model the activities of the control sub-process https://store.theartofservice.com/the-security-management-toolkit.html
50
ITIL security management - Control 1 Furthermore, it is noticeable that the first two activities are not linked with an arrow and that there is a black stripe with an arrow leading to the reporting activity. This means that the two first activities are not sequential. They are unordered activities and after these two activities have taken place the reporting activity will sequentially follow. For a more extensive explanation of the meta-modeling technique consult the Meta-modeling wiki. https://store.theartofservice.com/the-security-management-toolkit.html
51
ITIL security management - Control 1 CONTROL DOCUMENTSCONTROL is a description of how SECURITY MANAGEMENT will be organized and how it will be managed. https://store.theartofservice.com/the-security-management-toolkit.html
52
ITIL security management - Control 1 POLICY STATEMENTSPOLICY STATEMENTS are documents that outlines specific requirements or rules that must be met. In the information security realm, policies are usually point-specific, covering a single area. For example, an “Acceptable Use” policy would cover the rules and regulations for appropriate use of the computing facilities. https://store.theartofservice.com/the-security-management-toolkit.html
53
ITIL security management - Control 1 SECURITY MANAGEMENT FRAMEWORKSECURITY MANAGEMENT FRAMEWORK is an established management framework to initiate and control the implementation of information security within your organization and to manage ongoing information security provision. https://store.theartofservice.com/the-security-management-toolkit.html
54
ITIL security management - Control 1 The meta-data model of the control sub- process is based on a UML class diagram. In figure 2.1.2 is the meta-data model of the control sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
55
ITIL security management - Control 1 The CONTROL rectangle with a white shadow is an open complex concept. This means that the CONTROL rectangle consists of a collection of (sub) concepts and these concepts are expanded in this particular context. https://store.theartofservice.com/the-security-management-toolkit.html
56
ITIL security management - Plan 1 The Plan sub-process contains activities that in cooperation with the Service Level Management lead to the (information) Security section in the SLA. https://store.theartofservice.com/the-security-management-toolkit.html
57
ITIL security management - Plan 1 Furthermore, the Plan sub-process contains activities that are related to the underpinning contracts which are specific for (information) security. https://store.theartofservice.com/the-security-management-toolkit.html
58
ITIL security management - Plan 1 In the Plan sub-process the goals formulated in the SLA are specified in the form of Operational Level Agreements (OLA). https://store.theartofservice.com/the-security-management-toolkit.html
59
ITIL security management - Plan 1 These OLA’s can be defined as security plans for a specific internal organization entity of the service provider. https://store.theartofservice.com/the-security-management-toolkit.html
60
ITIL security management - Plan 1 Besides the input of the SLA, the Plan sub-process also works with the policy statements of the service provider itself. https://store.theartofservice.com/the-security-management-toolkit.html
61
ITIL security management - Plan 1 As said earlier these policy statements are defined in the control sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
62
ITIL security management - Plan 1 The Operational Level Agreements for information security are set up and implemented based on the ITIL process. https://store.theartofservice.com/the-security-management-toolkit.html
63
ITIL security management - Plan 1 For example if the security management wishes to change the IT infrastructure in order to achieve maximum security, these changes will only be done through the Change Management process. https://store.theartofservice.com/the-security-management-toolkit.html
64
ITIL security management - Plan 1 The Security Management will deliver the input (Request for change) for this change. https://store.theartofservice.com/the-security-management-toolkit.html
65
ITIL security management - Plan 1 PlanCreate Security section for SLA This process contains activities that lead to the security agreements paragraph in the service level agreements. https://store.theartofservice.com/the-security-management-toolkit.html
66
ITIL security management - Plan 1 At the end of this process the Security section of the service level agreement is created. https://store.theartofservice.com/the-security-management-toolkit.html
67
ITIL security management - Plan 1 Create underpinning ContractsThis process contains activities that lead to UNDERPINNING CONTRACTS. https://store.theartofservice.com/the-security-management-toolkit.html
68
ITIL security management - Plan 1 These contracts are specific for security. https://store.theartofservice.com/the-security-management-toolkit.html
69
ITIL security management - Plan 1 Create Operational level agreementsThe general formulated goals in the SLA are specified in operational level agreements. https://store.theartofservice.com/the-security-management-toolkit.html
70
ITIL security management - Plan 1 plans for specific organization units. https://store.theartofservice.com/the-security-management-toolkit.html
71
ITIL security management - Plan 1 ReportingIn this process the whole Create plan process is documented in a specific way. https://store.theartofservice.com/the-security-management-toolkit.html
72
ITIL security management - Plan 1 As well as for the Control sub-process the Plan sub-process has been modeled using the meta-modeling technique. https://store.theartofservice.com/the-security-management-toolkit.html
73
ITIL security management - Plan 1 On the right side of figure 2.2.1 the meta-process model of the Plan sub-process is given. https://store.theartofservice.com/the-security-management-toolkit.html
74
ITIL security management - Plan 1 As you can see the Plan sub-process consists of a combination of unordered and ordered (sub) activities. https://store.theartofservice.com/the-security-management-toolkit.html
75
ITIL security management - Plan 1 Furthermore, it is noticeable that the sub- process contains three complex activities which are all closed activities and one standard activity. https://store.theartofservice.com/the-security-management-toolkit.html
76
ITIL security management - Plan 1 Table 2.2.1 consists of concepts that are created or adjusted during the plan sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
77
ITIL security management - Plan 1 PLANFormulated schemes for the security agreements. https://store.theartofservice.com/the-security-management-toolkit.html
78
ITIL security management - Plan 1 Security section of the security level agreementsThe security agreements paragraph in the written agreements between a Service Provider and the customer(s) that documents agreed Service Levels for a service. https://store.theartofservice.com/the-security-management-toolkit.html
79
ITIL security management - Plan 1 UNDERPINNING CONTRACTSA contract with an external supplier covering delivery of services that support the IT organisation in their delivery of services. https://store.theartofservice.com/the-security-management-toolkit.html
80
ITIL security management - Plan 1 OPERATIONAL LEVEL AGREEMENTS An internal agreement covering the delivery of services which support the IT organization in their delivery of services. https://store.theartofservice.com/the-security-management-toolkit.html
81
ITIL security management - Plan 1 The two closed concepts are not expanded in this particular context. https://store.theartofservice.com/the-security-management-toolkit.html
82
ITIL security management - Plan 1 The following picture (figure 2.2.1) is the process- data diagram of the Plan sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
83
ITIL security management - Plan 1 This picture shows the integration of the two models. https://store.theartofservice.com/the-security-management-toolkit.html
84
ITIL security management - Plan 1 The dotted arrows indicate which concepts are created or adjusted in the corresponding activities of the Plan sub- process. https://store.theartofservice.com/the-security-management-toolkit.html
85
ITIL security management - Implementation 1 The Implementation sub-process makes sure that all measures, as specified in the plans, are properly implemented. https://store.theartofservice.com/the-security-management-toolkit.html
86
ITIL security management - Implementation 1 During the Implementation sub-process no (new) measures are defined nor changed. https://store.theartofservice.com/the-security-management-toolkit.html
87
ITIL security management - Implementation 1 The definition or change of measures will take place in the Plan sub-process in cooperation with the Change Management Process. https://store.theartofservice.com/the-security-management-toolkit.html
88
ITIL security management - Implementation 1 The activities that take place in the implementation sub-process are summed up in the following table (table 2.3.1). https://store.theartofservice.com/the-security-management-toolkit.html
89
ITIL security management - Implementation 1 The table contains the name of the (sub) activity and a short definition of the activity. https://store.theartofservice.com/the-security-management-toolkit.html
90
ITIL security management - Implementation 1 ImplementClassifying and managing of IT applicationsProcess of formally grouping configuration items by type, e.g., software, hardware, documentation, environment, application. https://store.theartofservice.com/the-security-management-toolkit.html
91
ITIL security management - Implementation 1 Process of formally identifying changes by type e.g., project scope change request, validation change request, infrastructure change request this process leads to asset classification and control documents. https://store.theartofservice.com/the-security-management-toolkit.html
92
ITIL security management - Implementation 1 Implement personnel securityHere measures are adopted in order to give personnel safety and confidence and measures to prevent a crime/fraud. https://store.theartofservice.com/the-security-management-toolkit.html
93
ITIL security management - Implementation 1 Implement security managementIn this process specific security requirements and/or security rules that must be met are outlined and documented. https://store.theartofservice.com/the-security-management-toolkit.html
94
ITIL security management - Implementation 1 Implement access controlIn this process specific access security requirements and/or access security rules that must be met are outlined and documented. https://store.theartofservice.com/the-security-management-toolkit.html
95
ITIL security management - Implementation 1 ReportingIn this process the whole implement as planned process is documented in a specific way. https://store.theartofservice.com/the-security-management-toolkit.html
96
ITIL security management - Implementation 1 Table 2.3.1: (Sub) activities and descriptions Implementation sub-process ITIL Security Management https://store.theartofservice.com/the-security-management-toolkit.html
97
ITIL security management - Implementation 1 The left side of figure 2.3.1 is the meta-process model of the Implementation phase. https://store.theartofservice.com/the-security-management-toolkit.html
98
ITIL security management - Implementation 1 The four labels with a black shadow mean that these activities are closed concepts and they are not expanded in this context. https://store.theartofservice.com/the-security-management-toolkit.html
99
ITIL security management - Implementation 1 It is also noticeable that there are no arrows connecting these four activities this means that these activities are unordered and the reporting will be carried out after the completion of al the four activities. https://store.theartofservice.com/the-security-management-toolkit.html
100
ITIL security management - Implementation 1 During the implementation phase there are a number of concepts that are created and /or adjusted. https://store.theartofservice.com/the-security-management-toolkit.html
101
ITIL security management - Implementation 1 ImplementationAccomplished security management according to the security management plan. https://store.theartofservice.com/the-security-management-toolkit.html
102
ITIL security management - Implementation 1 Asset classification and control documents A comprehensive inventory of assets with responsibility assigned to ensure that effective security protection is maintained. https://store.theartofservice.com/the-security-management-toolkit.html
103
ITIL security management - Implementation 1 Personnel securityWell defined job descriptions for all staff outlining security roles and responsibilities. https://store.theartofservice.com/the-security-management-toolkit.html
104
ITIL security management - Implementation 1 Security policiesSecurity policies are documents that outlines specific security requirements or security rules that must be met. https://store.theartofservice.com/the-security-management-toolkit.html
105
ITIL security management - Implementation 1 Access controlNetwork management to ensure that only those with the appropriate responsibility have access to information in the networks and the protection of the supporting infrastructure. https://store.theartofservice.com/the-security-management-toolkit.html
106
ITIL security management - Implementation 1 Table 2.3.2: Concept and definition Implementation sub-process Security management https://store.theartofservice.com/the-security-management-toolkit.html
107
ITIL security management - Implementation 1 The concepts created and/or adjusted are modeled using the meta-modeling technique. https://store.theartofservice.com/the-security-management-toolkit.html
108
ITIL security management - Implementation 1 The right side of figure 2.3.1 is the meta-data model of the implementation sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
109
ITIL security management - Implementation 1 The implementation documents are an open concept and is expanded upon in this context. https://store.theartofservice.com/the-security-management-toolkit.html
110
ITIL security management - Implementation 1 It consists of four closed concepts which are not expanded because they are irrelevant in this particular context. https://store.theartofservice.com/the-security-management-toolkit.html
111
ITIL security management - Implementation 1 In order to make the relations between the two models clearer the integration of the two models are illustrated in figure 2.3.1. https://store.theartofservice.com/the-security-management-toolkit.html
112
ITIL security management - Implementation 1 The dotted arrows running from the activities to the concepts illustrate which concepts are created/ adjusted in the corresponding activities. https://store.theartofservice.com/the-security-management-toolkit.html
113
ITIL security management - Implementation 1 Figure 2.3.1: Process-data model Implementation sub- process https://store.theartofservice.com/the-security-management-toolkit.html
114
ITIL security management - Evaluation 1 The evaluation of the implementation and the plans is very important. https://store.theartofservice.com/the-security-management-toolkit.html
115
ITIL security management - Evaluation 1 The evaluation is necessary to measure the success of the implementation and the Security plans. https://store.theartofservice.com/the-security-management-toolkit.html
116
ITIL security management - Evaluation 1 The evaluation is also very important for the clients (and possibly third parties). https://store.theartofservice.com/the-security-management-toolkit.html
117
ITIL security management - Evaluation 1 The results of the Evaluation sub-process are used to maintain the agreed measures and the implementation itself. https://store.theartofservice.com/the-security-management-toolkit.html
118
ITIL security management - Evaluation 1 Evaluation results can lead to new requirements and so lead to a Request for Change. https://store.theartofservice.com/the-security-management-toolkit.html
119
ITIL security management - Evaluation 1 The request for change is then defined and it is then send to the Change Management process. https://store.theartofservice.com/the-security-management-toolkit.html
120
ITIL security management - Evaluation 1 Mainly there are three sorts of evaluation; the Self-assessment; internal audit, and external audit. https://store.theartofservice.com/the-security-management-toolkit.html
121
ITIL security management - Evaluation 1 The self-assessment is mainly carried out in the organization of the processes. https://store.theartofservice.com/the-security-management-toolkit.html
122
ITIL security management - Evaluation 1 The internal audits are carried out by internal IT-auditors and the external audits are carried out by external independent IT- auditors. https://store.theartofservice.com/the-security-management-toolkit.html
123
ITIL security management - Evaluation 1 Besides, the evaluations already mentioned an evaluation based on the communicated security incidents will also take place. https://store.theartofservice.com/the-security-management-toolkit.html
124
ITIL security management - Evaluation 1 The most important activities for this evaluation are the security monitoring of IT-systems; verify if the security legislation and the implementation of the security plans are complied; trace and react to undesirable use of the IT-supplies. https://store.theartofservice.com/the-security-management-toolkit.html
125
ITIL security management - Evaluation 1 The activities that take place in the evaluation sub-process are summed up in the following table (Table 2.4.1). https://store.theartofservice.com/the-security-management-toolkit.html
126
ITIL security management - Evaluation 1 EvaluateSelf-assessmentIn this process an examination of the implemented security agreements is done by the organization of the process itself. https://store.theartofservice.com/the-security-management-toolkit.html
127
ITIL security management - Evaluation 1 The result of this process is SELF ASSESSMENT DOCUMENTS. https://store.theartofservice.com/the-security-management-toolkit.html
128
ITIL security management - Evaluation 1 Internal AuditIn this process an examination of the implemented security agreements is done by an internal EDP auditor. https://store.theartofservice.com/the-security-management-toolkit.html
129
ITIL security management - Evaluation 1 External auditIn this process an examination of the implemented security agreements is done by an external EDP auditor. https://store.theartofservice.com/the-security-management-toolkit.html
130
ITIL security management - Evaluation 1 Evaluation based on security incidentsIn this process an examination of the implemented security agreements is done based on security events which is not part of the standard operation of a service and which causes, or may cause, an interruption to, or a reduction in, the quality of that service. https://store.theartofservice.com/the-security-management-toolkit.html
131
ITIL security management - Evaluation 1 ReportingIn this process the whole Evaluate implementation process is documented in a specific way. https://store.theartofservice.com/the-security-management-toolkit.html
132
ITIL security management - Evaluation 1 Table 2.4.1: (Sub) activities and descriptions Evaluation sub-process ITIL Security Management https://store.theartofservice.com/the-security-management-toolkit.html
133
ITIL security management - Evaluation 1 Figure 2.4.1: Process-data model Evaluation sub-process https://store.theartofservice.com/the-security-management-toolkit.html
134
ITIL security management - Evaluation 1 The process-data diagram illustrated in the figure 2.4.1 consists of a meta-process model and a meta-data model. https://store.theartofservice.com/the-security-management-toolkit.html
135
ITIL security management - Evaluation 1 The Evaluation sub- process was modeled using the meta- modeling technique. https://store.theartofservice.com/the-security-management-toolkit.html
136
ITIL security management - Evaluation 1 The dotted arrows running from the meta- process diagram (left) to the meta-data diagram (right) indicate which concepts are created/ adjusted in the corresponding activities. https://store.theartofservice.com/the-security-management-toolkit.html
137
ITIL security management - Evaluation 1 All of the activities in the evaluation phase are standard activities. https://store.theartofservice.com/the-security-management-toolkit.html
138
ITIL security management - Evaluation 1 For a short description of the Evaluation phase concepts see Table 2.4.2 where the concepts are listed and defined. https://store.theartofservice.com/the-security-management-toolkit.html
139
ITIL security management - Evaluation 1 EVALUATION Evaluated/checked implementation. https://store.theartofservice.com/the-security-management-toolkit.html
140
ITIL security management - Evaluation 1 RESULTSThe outcome of the evaluated implementation. https://store.theartofservice.com/the-security-management-toolkit.html
141
ITIL security management - Evaluation 1 SELF ASSESSMENT DOCUMENTS Result of the examination of the security management by the organization of the process itself. https://store.theartofservice.com/the-security-management-toolkit.html
142
ITIL security management - Evaluation 1 INTERNAL AUDITResult of the examination of the security management by the internal EDP auditor. https://store.theartofservice.com/the-security-management-toolkit.html
143
ITIL security management - Evaluation 1 EXTERNAL AUDITResult of the examination of the security management by the external EDP auditor. https://store.theartofservice.com/the-security-management-toolkit.html
144
ITIL security management - Evaluation 1 SECURITY INCIDENTS DOCUMENTS Results of evaluating security events which is not part of the standard operation of a service and which causes, or may cause, an interruption to, or a reduction in, the quality of that service. https://store.theartofservice.com/the-security-management-toolkit.html
145
ITIL security management - Evaluation 1 Table 2.4.2: Concept and definition evaluation sub- process Security management https://store.theartofservice.com/the-security-management-toolkit.html
146
ITIL security management - Maintenance 1 It is necessary for the security to be maintained. https://store.theartofservice.com/the-security-management-toolkit.html
147
ITIL security management - Maintenance 1 Because of changes in the IT- infrastructure and changes in the organization itself security risks are bound to change over time. https://store.theartofservice.com/the-security-management-toolkit.html
148
ITIL security management - Maintenance 1 The maintenance of the security concerns both the maintenance of the security section of the service level agreements and the more detailed security plans. https://store.theartofservice.com/the-security-management-toolkit.html
149
ITIL security management - Maintenance 1 The maintenance is based on the results of the Evaluation sub-process and insight in the changing risks. https://store.theartofservice.com/the-security-management-toolkit.html
150
ITIL security management - Maintenance 1 These activities will only produce proposals. https://store.theartofservice.com/the-security-management-toolkit.html
151
ITIL security management - Maintenance 1 The proposals serve as inputs for the plan sub-process and will go through the whole cycle or the proposals can be taken in the maintenance of the service level agreements. https://store.theartofservice.com/the-security-management-toolkit.html
152
ITIL security management - Maintenance 1 In both cases the proposals could lead to activities in the action plan. https://store.theartofservice.com/the-security-management-toolkit.html
153
ITIL security management - Maintenance 1 The actual changes will be carried by the Change Management process. https://store.theartofservice.com/the-security-management-toolkit.html
154
ITIL security management - Maintenance 1 For more information about the Change Management Process consult the Change Management Wiki. https://store.theartofservice.com/the-security-management-toolkit.html
155
ITIL security management - Maintenance 1 The activities that take place in the maintain sub-process are summed up in the following table (Table 2.5.1). https://store.theartofservice.com/the-security-management-toolkit.html
156
ITIL security management - Maintenance 1 Request for change to SLA and/or OLARequest for a change to the SLA and/or OLA is formulated. https://store.theartofservice.com/the-security-management-toolkit.html
157
ITIL security management - Maintenance 1 ReportingIn this process the whole maintain implemented security policies process is documented in a specific way. https://store.theartofservice.com/the-security-management-toolkit.html
158
ITIL security management - Maintenance 1 Table 2.5.1: (Sub) activities and descriptions Maintenance sub-process ITIL Security Management https://store.theartofservice.com/the-security-management-toolkit.html
159
ITIL security management - Maintenance 1 Figure 2.5.1 is the process-data diagram of the implementation sub-process. https://store.theartofservice.com/the-security-management-toolkit.html
160
ITIL security management - Maintenance 1 This picture shows the integration of the meta-process model (left) and the meta- data model (right). https://store.theartofservice.com/the-security-management-toolkit.html
161
ITIL security management - Maintenance 1 Figure 2.5.1: Process-data model Maintenance sub- process https://store.theartofservice.com/the-security-management-toolkit.html
162
ITIL security management - Maintenance 1 The maintenance sub-process starts with the maintenance of the service level agreements and the maintenance of the operational level agreements. https://store.theartofservice.com/the-security-management-toolkit.html
163
ITIL security management - Maintenance 1 After these activities take place (in no particular order) and there is a request for a change the request for change activity will take place and after the request for change activity is concluded the reporting activity starts. https://store.theartofservice.com/the-security-management-toolkit.html
164
ITIL security management - Maintenance 1 If there is no request for a change then the reporting activity will start directly after the first two activities. https://store.theartofservice.com/the-security-management-toolkit.html
165
ITIL security management - Maintenance 1 The concepts in the meta-data model are created/ adjusted during the maintenance phase. https://store.theartofservice.com/the-security-management-toolkit.html
166
ITIL security management - Maintenance 1 MAINTENANCE DOCUMENTS Agreements kept in proper condition. https://store.theartofservice.com/the-security-management-toolkit.html
167
ITIL security management - Maintenance 1 MAINTAINED SERVICE LEVEL AGREEMENTSService Level Agreements(security paragraph) kept in proper condition. https://store.theartofservice.com/the-security-management-toolkit.html
168
ITIL security management - Maintenance 1 REQUEST FOR CHANGEForm, or screen, used to record details of a request for a change to the SLA/OLA. https://store.theartofservice.com/the-security-management-toolkit.html
169
ITIL security management - Maintenance 1 Table 2.5.2: Concept and definition Plan sub-process Security management https://store.theartofservice.com/the-security-management-toolkit.html
170
ITIL security management - Complete process-data model 1 The following picture shows the complete process-data model of the Security Management process. This means that the complete meta-process model and the complete meta-data model and the integrations of the two models of the Security Management process are shown. https://store.theartofservice.com/the-security-management-toolkit.html
171
ITIL security management - Complete process-data model 1 Figure 2.6.1: Process- data model Security Management process https://store.theartofservice.com/the-security-management-toolkit.html
172
ITIL security management - Relations with other ITIL processes 1 The security Management Process, as stated in the introduction, has relations with almost all other ITIL-processes. https://store.theartofservice.com/the-security-management-toolkit.html
173
ITIL security management - Relations with other ITIL processes 1 IT Customer Relationship Management https://store.theartofservice.com/the-security-management-toolkit.html
174
ITIL security management - Relations with other ITIL processes 1 IT Service Continuity Management https://store.theartofservice.com/the-security-management-toolkit.html
175
ITIL security management - Relations with other ITIL processes 1 Within these processes there are a couple of activities concerning security that have to take place. https://store.theartofservice.com/the-security-management-toolkit.html
176
ITIL security management - Relations with other ITIL processes 1 However, the Security Management will give indications to the concerning process on how these (security specific) activities should be structured. https://store.theartofservice.com/the-security-management-toolkit.html
177
ITIL security management - Example 1 The use of internal e-mail in an organization has a lot of security risks. So if an organization chooses to use e-mail as a means of communication, it is highly needed that the organization implements a well thought e-mail security plan/policies. In this example the ITIL security Management approach is used to implement e-mail policies in an organization. https://store.theartofservice.com/the-security-management-toolkit.html
178
ITIL security management - Example 1 First of the Security management team is formed and the guidelines, of how the process should be carried out, are formulated and made clear to all employees and provider concerned. These actions are carried out in the Control phase of the Security Management process. https://store.theartofservice.com/the-security-management-toolkit.html
179
ITIL security management - Example 1 The next step in to process to implement e-mail policies is the Planning. In the Plan phase of the process the policies are formulated. Besides the policies that are already written in the Service Level Agreements the policies that are specific for the e-mail security are formulated and added to the service level agreements. At the end of this phase the entire plan is formulated and is ready to be implemented. https://store.theartofservice.com/the-security-management-toolkit.html
180
ITIL security management - Example 1 The following phase in the process is the actual implementation of the e-mail policies. The implementation is done according to the plan which was formulated in the preceding phase (Plan phase). https://store.theartofservice.com/the-security-management-toolkit.html
181
ITIL security management - Example 1 After the actual implementation the e-mail policies will be evaluated. In order to evaluate the implemented policies the organization will perform; https://store.theartofservice.com/the-security-management-toolkit.html
182
ITIL security management - Example 1 The last phase is the maintenance phase. In the maintenance phase the implemented e-mail policies are maintained. The organization now knows which policies are properly implemented and are properly followed and, which policies need more work in order to help the security plan of the organization and, if there are new policies that have to be implemented. At the end of this process the Request for change are formulated (if needed) and the e-mail policies are properly maintained. https://store.theartofservice.com/the-security-management-toolkit.html
183
ITIL security management - Example 1 In order for the organization to keep its security plan up-to-date the organization will have to perform the security management process continuously. There is no end to this process an organization can always better its security. https://store.theartofservice.com/the-security-management-toolkit.html
184
Security management 1 Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. https://store.theartofservice.com/the-security-management-toolkit.html
185
Security management 1 An organisation uses such security management procedures as information classification, risk assessment, and risk analysis to identify threats, categorise assets, and rate system vulnerabilities so that they can implement effective controls. https://store.theartofservice.com/the-security-management-toolkit.html
186
Security management - Loss prevention 1 Loss prevention focuses on what your critical assets are and how you are going to protect them. A key component to loss prevention is assessing the potential threats to the successful achievement of the goal. This must include the potential opportunities that further the object (why take the risk unless there's an upside?) Balance probability and impact determine and implement measures to minimize or eliminate those threats. https://store.theartofservice.com/the-security-management-toolkit.html
187
Security management - Security risk management 1 Management of security risks applies the principles of risk management to the management of security threats. It consists of identifying threats (or risk causes), assessing the effectiveness of existing controls to face those threats, determining the risks' consequence(s), prioritising the risks by rating the likelihood and impact, classifying the type of risk and selecting and appropriate risk option or risk response. https://store.theartofservice.com/the-security-management-toolkit.html
188
Security management - External 1 Strategic: like competition and customer demand https://store.theartofservice.com/the-security-management-toolkit.html
189
Security management - External 1 Operational: Regulation, suppliers, contracts https://store.theartofservice.com/the-security-management-toolkit.html
190
Security management - External 1 Compliance: new regulatory or legal requirements are introduced, or existing ones are changed, exposing the organisation to a non-compliance risk if measures are not taken to ensure compliance https://store.theartofservice.com/the-security-management-toolkit.html
191
Security management - Internal 1 Hazard: Safety and security; employees and equipment https://store.theartofservice.com/the-security-management-toolkit.html
192
Security management - Internal 1 Compliance: Actual or potential changes in the organisation's systems, processes, suppliers, etc. may create exposure to a legal or regulatory non-compliance. https://store.theartofservice.com/the-security-management-toolkit.html
193
Security management - Risk avoidance 1 The first choice to be considered. The possibility of eliminating the existence of criminal opportunity or avoiding the creation of such an opportunity is always the best solution, when additional considerations or factors are not created as a result of this action that would create a greater risk. As an example, removing all the cash from a retail outlet would eliminate the opportunity for stealing the cash–but it would also eliminate the ability to conduct business. https://store.theartofservice.com/the-security-management-toolkit.html
194
Security management - Risk reduction 1 When avoiding or eliminating the criminal opportunity conflicts with the ability to conduct business, the next step is the reduction of the opportunity and potential loss to the lowest level consistent with the function of the business. In the example above, the application of risk reduction might result in the business keeping only enough cash on hand for one day’s operation. https://store.theartofservice.com/the-security-management-toolkit.html
195
Security management - Risk spreading 1 Assets that remain exposed after the application of reduction and avoidance are the subjects of risk spreading. This is the concept that limits loss or potential losses by exposing the perpetrator to the probability of detection and apprehension prior to the consummation of the crime through the application of perimeter lighting, barred windows and intrusion detection systems. The idea here is to reduce the time available to steal assets and escape without apprehension. https://store.theartofservice.com/the-security-management-toolkit.html
196
Security management - Risk transfer 1 Transferring risks to other alternatives when those risks have not been reduced to acceptable levels. The two primary methods of accomplishing risk transfer are to insure the assets or raise prices to cover the loss in the event of a criminal act. Generally speaking, when the first three steps have been properly applied, the cost of transferring risks are much lower. https://store.theartofservice.com/the-security-management-toolkit.html
197
Security management - Risk acceptance 1 All remaining risks must simply be assumed by the business as a risk of doing business. Included with these accepted losses are deductibles which have been made as part of the insurance coverage. https://store.theartofservice.com/the-security-management-toolkit.html
198
Security management - Access control 1 Locks, simple or sophisticated, such as biometric authentication and keycard locks https://store.theartofservice.com/the-security-management-toolkit.html
199
Security management - Physical security 1 Security guards (armed or unarmed) with wireless communication devices (e.g., two-way radio) https://store.theartofservice.com/the-security-management-toolkit.html
200
Federal Information Security Management Act of 2002 1 Federal Information Security Management Act of 2002 https://store.theartofservice.com/the-security-management-toolkit.html
201
Federal Information Security Management Act of 2002 1 The Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C https://store.theartofservice.com/the-security-management-toolkit.html
202
Federal Information Security Management Act of 2002 1 FISMA has brought attention within the federal government to cybersecurity and explicitly emphasized a "risk-based policy for cost-effective security." FISMA requires agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency’s information security program and report the results to Office of Management and Budget (OMB) https://store.theartofservice.com/the-security-management-toolkit.html
203
Federal Information Security Management Act of 2002 - Purpose of the act 1 FISMA assigns specific responsibilities to federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information system security. In particular, FISMA requires the head of each agency to implement policies and procedures to cost-effectively reduce information technology security risks to an acceptable level. https://store.theartofservice.com/the-security-management-toolkit.html
204
Federal Information Security Management Act of 2002 - Purpose of the act 1 According to FISMA, the term information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability. https://store.theartofservice.com/the-security-management-toolkit.html
205
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 In accordance with FISMA, NIST is responsible for developing standards, guidelines, and associated methods and techniques for providing adequate information security for all agency operations and assets, excluding national security systems https://store.theartofservice.com/the-security-management-toolkit.html
206
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 Information Security Automation Program (ISAP) https://store.theartofservice.com/the-security-management-toolkit.html
207
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 National Vulnerability Database (NVD) – the U.S. government content repository for ISAP and SCAP. NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g., FISMA) https://store.theartofservice.com/the-security-management-toolkit.html
208
Federal Information Security Management Act of 2002 - Compliance framework defined by FISMA and supporting standards 1 FISMA defines a framework for managing information security that must be followed for all information systems used or operated by a U.S. federal government agency in the executive or legislative branches, or by a contractor or other organization on behalf of a federal agency in those branches. This framework is further defined by the standards and guidelines developed by National Institute of Standards and Technology|NIST.The 2002 Federal Information Security Management Act (FISMA) https://store.theartofservice.com/the-security-management-toolkit.html
209
Federal Information Security Management Act of 2002 - Inventory of information systems 1 FISMA requires that agencies have in place an information systems inventory https://store.theartofservice.com/the-security-management-toolkit.html
210
Federal Information Security Management Act of 2002 - Categorize information and information systems according to risk level 1 All information and information systems should be categorized based on the objectives of providing appropriate levels of information security according to a range of risk levels https://store.theartofservice.com/the-security-management-toolkit.html
211
Federal Information Security Management Act of 2002 - Categorize information and information systems according to risk level 1 The first mandatory security standard required by the FISMA legislation, FIPS 199 Standards for Security Categorization of Federal Information and Information Systems provides the definitions of security categories. The guidelines are provided by NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories. https://store.theartofservice.com/the-security-management-toolkit.html
212
Federal Information Security Management Act of 2002 - Categorize information and information systems according to risk level 1 The overall FIPS 199 system categorization is the high water mark for the impact rating of any of the criteria for information types resident in a system. For example, if one information type in the system has a rating of Low for confidentiality, integrity, and availability, and another type has a rating of Low for confidentiality and availability but a rating of Moderate for integrity, then the entire system has a FIPS 199 categorization of Moderate. https://store.theartofservice.com/the-security-management-toolkit.html
213
Federal Information Security Management Act of 2002 - Security controls 1 Federal information systems must meet the minimum security requirements. These requirements are defined in the second mandatory security standard required by the FISMA legislation, FIPS 200 Minimum Security Requirements for Federal Information and Information Systems. https://store.theartofservice.com/the-security-management-toolkit.html
214
Federal Information Security Management Act of 2002 - Security controls 1 Organizations must meet the minimum security requirements by selecting the appropriate security controls and assurance requirements as described in NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems https://store.theartofservice.com/the-security-management-toolkit.html
215
Federal Information Security Management Act of 2002 - Security controls 1 Agencies have flexibility in applying the baseline security controls in accordance with the tailoring guidance provided in Special Publication 800-53. This allows agencies to adjust the security controls to more closely fit their mission requirements and operational environments. https://store.theartofservice.com/the-security-management-toolkit.html
216
Federal Information Security Management Act of 2002 - Security controls 1 The controls selected or planned must be documented in the System Security Plan. https://store.theartofservice.com/the-security-management-toolkit.html
217
Federal Information Security Management Act of 2002 - Risk assessment 1 The combination of FIPS 200 and NIST Special Publication 800-53 requires a foundational level of security for all federal information and information systems https://store.theartofservice.com/the-security-management-toolkit.html
218
Federal Information Security Management Act of 2002 - Risk assessment 1 A risk assessment starts by identifying potential threat (computer)|threats and vulnerability (computing)|vulnerabilities and mapping implemented security control|controls to individual vulnerabilities https://store.theartofservice.com/the-security-management-toolkit.html
219
Federal Information Security Management Act of 2002 - Risk assessment 1 NIST also initiated the Information Security Automation Program (ISAP) and Security Content Automation Protocol (SCAP) that support and complement the approach for achieving consistent, cost-effective security control assessments. https://store.theartofservice.com/the-security-management-toolkit.html
220
Federal Information Security Management Act of 2002 - System security plan 1 Agencies should develop policy on the system security planning process. NIST SP-800-18 introduces the concept of a System Security Plan. System security plans are living documents that require periodic review, modification, and plans of action and milestones for implementing security controls. Procedures should be in place outlining who reviews the plans, keeps the plan current, and follows up on planned security controls. https://store.theartofservice.com/the-security-management-toolkit.html
221
Federal Information Security Management Act of 2002 - System security plan 1 The System security plan is the major input to the security certification and accreditation process for the system https://store.theartofservice.com/the-security-management-toolkit.html
222
Federal Information Security Management Act of 2002 - Certification and accreditation 1 Once the system documentation and risk assessment has been completed, the system's controls must be reviewed and certified to be functioning appropriately. Based on the results of the review, the information system is accredited. The certification and accreditation process is defined in NIST SP 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems.NIST SP 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems https://store.theartofservice.com/the-security-management-toolkit.html
223
Federal Information Security Management Act of 2002 - Certification and accreditation 1 Security accreditation is the official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations, agency assets, or individuals based on the implementation of an agreed-upon set of security controls https://store.theartofservice.com/the-security-management-toolkit.html
224
Federal Information Security Management Act of 2002 - Certification and accreditation 1 The information and supporting evidence needed for security accreditation is developed during a detailed security review of an information system, typically referred to as security certification https://store.theartofservice.com/the-security-management-toolkit.html
225
Federal Information Security Management Act of 2002 - Continuous monitoring 1 All accredited systems are required to monitor a selected set of security controls and the system documentation is updated to reflect changes and modifications to the system. Large changes to the security profile of the system should trigger an updated risk assessment, and controls that are significantly modified may need to be re-certified. https://store.theartofservice.com/the-security-management-toolkit.html
226
Federal Information Security Management Act of 2002 - Continuous monitoring 1 Continuous monitoring activities include configuration management and control of information system components, security impact analyses of changes to the system, ongoing assessment of security controls, and status reporting https://store.theartofservice.com/the-security-management-toolkit.html
227
Federal Information Security Management Act of 2002 - Critique 1 Security experts Bruce Brody, a former federal chief information security officer, and Alan Paller, director of research for the SANS Institute – have described FISMA as a well-intentioned but fundamentally flawed tool, and argued that the compliance and reporting methodology mandated by FISMA measures security planning rather than measuring information security https://store.theartofservice.com/the-security-management-toolkit.html
228
Information security management system 1 An information security management system (ISMS) is a set of policies concerned with information security management or IT related risks. The idioms arose primarily out of BS 7799. https://store.theartofservice.com/the-security-management-toolkit.html
229
Information security management system 1 The governing principle behind an ISMS is that an organization should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk. https://store.theartofservice.com/the-security-management-toolkit.html
230
Information security management system - ISMS description 1 As with all management processes, an ISMS must remain effective and efficient in the long term, adapting to changes in the internal organization and external environment. ISO/IEC 27001:2005 therefore incorporated the "Plan-Do- Check-Act" (PDCA), or Deming cycle, approach: https://store.theartofservice.com/the-security-management-toolkit.html
231
Information security management system - ISMS description 1 The Plan phase is about designing the ISMS, assessing information security risks and selecting appropriate controls. https://store.theartofservice.com/the-security-management-toolkit.html
232
Information security management system - ISMS description 1 The Check phase objective is to review and evaluate the performance (efficiency and effectiveness) of the ISMS. https://store.theartofservice.com/the-security-management-toolkit.html
233
Information security management system - ISMS description 1 ISO/IEC 27001:2005 is a risk based information security standard, which means that organizations need to have a risk management process in place. The risk management process fits into the PDCA model given above. https://store.theartofservice.com/the-security-management-toolkit.html
234
Information security management system - ISMS description 1 However, the latest standard, ISO/IEC 27001:2013, does not use this cycle. https://store.theartofservice.com/the-security-management-toolkit.html
235
Information security management system - ISMS description 1 Another competing ISMS is Information Security Forum's Standard of Good Practice (SOGP). It is more best practice- based as it comes from ISF's industry experiences. https://store.theartofservice.com/the-security-management-toolkit.html
236
Information security management system - ISMS description 1 Some other best known ISMSs include Common Criteria (CC) international standard and IT Security Evaluation Criteria (ITSEC) https://store.theartofservice.com/the-security-management-toolkit.html
237
Information security management system - ISMS description 1 Some nations use their own ISMS, e.g., Department of Defense(DoD) Information Technology Security Certification and Accreditation Process (DITSCAP) of USA, Department of Defense Information Assurance Certification and Accreditation Process(DIACAP) of USA, Trusted Computer System Evaluation Criteria (TCSEC) of USA, IT Baseline Protection Manual (ITBPM) of Germany, ISMS of Japan, ISMS of Korea, Information Security Check Service (ISCS) of Korea. https://store.theartofservice.com/the-security-management-toolkit.html
238
Information security management system - ISMS description 1 Other frameworks such as COBIT and ITIL touch on security issues, but are mainly geared toward creating a governance framework for information and IT more generally. COBIT has a companion framework Risk IT dedicated to Information security. https://store.theartofservice.com/the-security-management-toolkit.html
239
Information security management system - ISMS description 1 Below table illustrate the certification structure comparison of some best known ISMSs: https://store.theartofservice.com/the-security-management-toolkit.html
240
Information security management system - ISMS description 1 BS 7799Common Criteria(CC)IT Security Evaluation Criteria(ITSEC) https://store.theartofservice.com/the-security-management-toolkit.html
241
Information security management system - ISMS description 1 Operation Area EnglandAbout 25 CountriesEuropean Countries https://store.theartofservice.com/the-security-management-toolkit.html
242
Information security management system - ISMS description 1 - 11 Security domains https://store.theartofservice.com/the-security-management-toolkit.html
243
Information security management system - ISMS description 1 - 133 Security controls- 3 Parts https://store.theartofservice.com/the-security-management-toolkit.html
244
Information security management system - ISMS description 1 - 11 Security functional requirements https://store.theartofservice.com/the-security-management-toolkit.html
245
Information security management system - ISMS description 1 6- Prepare a statement of applicability1- PP/ST introduction https://store.theartofservice.com/the-security-management-toolkit.html
246
Information security management system - ISMS description 1 7- TOE summary specification https://store.theartofservice.com/the-security-management-toolkit.html
247
Information security management system - ISMS description 1 Difference of ProcessEmphasis on managerial securityEmphasis on technical securityEmphasis on managerial security https://store.theartofservice.com/the-security-management-toolkit.html
248
Information security management system - ISMS description 1 Specification Control PointProvide best code of practice for information security managementProvide common set of requirements for the security functionality of IT productsProvide common set of requirements for the security functionality of IT products https://store.theartofservice.com/the-security-management-toolkit.html
249
Information security management system - ISMS description 1 Evaluation MethodUse the PDAC model cycleFollow each certification evaluation procedureFollow commission of European communities https://store.theartofservice.com/the-security-management-toolkit.html
250
Information security management system - ISMS description 1 There are a number of initiatives focused to the governance and organizational issues of securing information systems having in mind that it is business and organizational problem, not only a technical problem: https://store.theartofservice.com/the-security-management-toolkit.html
251
Information security management system - ISMS description 1 Federal Information Security Management Act of 2002 is a United States federal law enacted in 2002 that recognized the importance of information security to the economic and national security interests of the United States https://store.theartofservice.com/the-security-management-toolkit.html
252
Information security management system - ISMS description 1 Governing for Enterprise Security Implementation Guide of the Carnegie Mellon University Software Engineering Institute CERT is designed to help business leaders implement an effective program to govern information technology (IT) and information security. https://store.theartofservice.com/the-security-management-toolkit.html
253
Information security management system - ISMS description 1 A Capability Maturity Model (CMM) for system security engineering was standardized in ISO/IEC 21827. https://store.theartofservice.com/the-security-management-toolkit.html
254
Information security management system - ISMS description 1 ISM3 is a standard for security management (how to achieve the organizations mission despite of errors, attacks and accidents with a given budget) https://store.theartofservice.com/the-security-management-toolkit.html
255
Information security management system - Need for an ISMS 1 Security experts say and statistics confirm that: https://store.theartofservice.com/the-security-management-toolkit.html
256
Information security management system - Need for an ISMS 1 information technology security administrators should expect to devote approximately one-third of their time addressing technical aspects. The remaining two-thirds should be spent developing policies and procedures, performing security reviews and analyzing risk, addressing contingency planning and promoting security awareness; https://store.theartofservice.com/the-security-management-toolkit.html
257
Information security management system - Need for an ISMS 1 security depends on people more than on technology; https://store.theartofservice.com/the-security-management-toolkit.html
258
Information security management system - Need for an ISMS 1 employees are a far greater threat to information security than outsiders; https://store.theartofservice.com/the-security-management-toolkit.html
259
Information security management system - Need for an ISMS 1 security is like a chain. It is only as strong as its weakest link; https://store.theartofservice.com/the-security-management-toolkit.html
260
Information security management system - Need for an ISMS 1 the degree of security depends on three factors: the risk you are willing to take, the functionality of the system and the costs you are prepared to pay; https://store.theartofservice.com/the-security-management-toolkit.html
261
Information security management system - Need for an ISMS 1 security is not a status or a snapshot, but a running process. https://store.theartofservice.com/the-security-management-toolkit.html
262
Information security management system - Need for an ISMS 1 These facts inevitably lead to the conclusion that security administration is a management issue, and not a purely technical issue. https://store.theartofservice.com/the-security-management-toolkit.html
263
Information security management system - Need for an ISMS 1 The establishment, maintenance and continuous update of an ISMS provide a strong indication that a company is using a systematic approach for the identification, assessment and management of information security risks. Critical factors of ISMS: https://store.theartofservice.com/the-security-management-toolkit.html
264
Information security management system - Need for an ISMS 1 Confidentiality: Protecting information from unauthorized parties. https://store.theartofservice.com/the-security-management-toolkit.html
265
Information security management system - Need for an ISMS 1 Integrity: Protecting information from modification by unauthorized users. https://store.theartofservice.com/the-security-management-toolkit.html
266
Information security management system - Need for an ISMS 1 Availability: Making the information available to authorized users. https://store.theartofservice.com/the-security-management-toolkit.html
267
Information security management system - Need for an ISMS 1 A company will be capable of successfully addressing information confidentiality, integrity and availability requirements which in turn have implications: https://store.theartofservice.com/the-security-management-toolkit.html
268
Information security management system - Need for an ISMS 1 In doing so, information security management will enable implementing the desirable qualitative characteristics of the services offered by the organization (i.e https://store.theartofservice.com/the-security-management-toolkit.html
269
Information security management system - Need for an ISMS 1 Large organizations or organizations such as banks and financial institutes, telecommunication operators, hospital and health institutes and public or governmental bodies have many reasons for addressing information security very seriously. Legal and regulatory requirements which aim at protecting sensitive or personal data as well as general public security requirements impel them to devote the utmost attention and priority to information security risks. https://store.theartofservice.com/the-security-management-toolkit.html
270
Information security management system - Need for an ISMS 1 Under these circumstances the development and implementation of a separate and independent management process namely an Information Security Management System is the one and only alternative. https://store.theartofservice.com/the-security-management-toolkit.html
271
Information security management system - Critical success factors for ISMS 1 have the continuous, unshakeable and visible support and commitment of the organization’s top management; https://store.theartofservice.com/the-security-management-toolkit.html
272
Information security management system - Critical success factors for ISMS 1 be an integral part of the overall management of the organization related to and reflecting the organization’s approach to risk management, the control objectives and controls and the degree of assurance required; https://store.theartofservice.com/the-security-management-toolkit.html
273
Information security management system - Critical success factors for ISMS 1 have security objectives and activities be based on business objectives and requirements and led by business management; https://store.theartofservice.com/the-security-management-toolkit.html
274
Information security management system - Critical success factors for ISMS 1 undertake only necessary tasks and avoiding over- control and waste of valuable resources; https://store.theartofservice.com/the-security-management-toolkit.html
275
Information security management system - Critical success factors for ISMS 1 fully comply with the organization philosophy and mindset by providing a system that instead of preventing people from doing what they are employed to do, it will enable them to do it in control and demonstrate their fulfilled accountabilities; https://store.theartofservice.com/the-security-management-toolkit.html
276
Information security management system - Critical success factors for ISMS 1 be based on continuous training and awareness of staff and avoid the use of disciplinary measures and “police” or “military” practices; https://store.theartofservice.com/the-security-management-toolkit.html
277
Information security management system - Dynamic issues in ISMS 1 There are three main problems which lead to uncertainty in information security management systems (ISMS): https://store.theartofservice.com/the-security-management-toolkit.html
278
Information security management system - Dynamic issues in ISMS 1 Dynamically changing security requirements of an organization https://store.theartofservice.com/the-security-management-toolkit.html
279
Information security management system - Dynamic issues in ISMS 1 Rapid technological development raises new security concerns for organizations. The existing security measures and requirements become obsolete as new vulnerabilities arise with the development in technology. To overcome this issue, the ISMS should organize and manage dynamically changing requirements and keep the system up-to-date. https://store.theartofservice.com/the-security-management-toolkit.html
280
Information security management system - Dynamic issues in ISMS 1 Externality is an economic concept for the effects borne by the party that is not directly involved in a transaction https://store.theartofservice.com/the-security-management-toolkit.html
281
Information security management system - Dynamic issues in ISMS 1 Obsolete evaluation of security concerns https://store.theartofservice.com/the-security-management-toolkit.html
282
Information security management system - Dynamic issues in ISMS 1 The evaluations of security concerns used in ISMS become obsolete as the technology progresses and new threats and vulnerabilities arise https://store.theartofservice.com/the-security-management-toolkit.html
283
ITIL - Information security management system 1 A basic goal of security management is to ensure adequate information security https://store.theartofservice.com/the-security-management-toolkit.html
284
Security systems - Security management in organizations 1 Inciting factors in the convergence of security disciplines include the development of digital video surveillance technologies (see Professional video over IP) and the digitization and networking of physical control systems (see SCADA).[ http://www.csoonline.com/read/090402/beast.html Taming the Two-Headed Beast], CSOonline, September 2002[ http://www.csoonline.com/read/041505/constellation.html Security 2.0], CSOonline, April 2005 Greater interdisciplinary cooperation is further evidenced by the February 2005 creation of the Alliance for Enterprise Security Risk Management, a joint venture including leading associations in security (ASIS International|ASIS), information security (Information Systems Security Association|ISSA, the Information Systems Security Association), and IT audit (ISACA, the Information Systems Audit and Control Association). https://store.theartofservice.com/the-security-management-toolkit.html
285
Fraud Squad - NHS Counter Fraud and Security Management Service 1 The National Health Service|NHS Counter Fraud and Security Management Service is an independent Division of the NHS Business Services Authority and has responsibility for all policy and operational matters relating to the prevention, detection and investigation of fraud and corruption and the management of security in the National Health Service.[http://www.cfsms.nhs.uk/ NHS Counter Fraud and Security Management Service (accessed 20/152/06)] https://store.theartofservice.com/the-security-management-toolkit.html
286
Fraud Squad - NHS Counter Fraud and Security Management Service 1 * NHS Counter Fraud Service established in September 1998 https://store.theartofservice.com/the-security-management-toolkit.html
287
Fraud Squad - NHS Counter Fraud and Security Management Service 1 * NHS Security Management Service was established in 2003 to form the NHS Counter Fraud and Security Management Service. https://store.theartofservice.com/the-security-management-toolkit.html
288
Fraud Squad - NHS Counter Fraud and Security Management Service 1 * To reduce fraud to an absolute minimum and hold it permanently at that level, releasing resources for better patient care and services https://store.theartofservice.com/the-security-management-toolkit.html
289
Fraud Squad - NHS Counter Fraud and Security Management Service 1 * With the delivery of an environment for those who use or work in the NHS which is properly secure so that the highest possible standard of clinical care can be made available to patients. https://store.theartofservice.com/the-security-management-toolkit.html
290
Federal Information Security Management Act of 2002 1 The 'Federal Information Security Management Act of 2002' ('FISMA',, et seq.) is a United States federal law enacted in 2002 as Title III of the E- Government Act of 2002 (, ) https://store.theartofservice.com/the-security-management-toolkit.html
291
Federal Information Security Management Act of 2002 1 OMB uses this data to assist in its oversight responsibilities and to prepare this annual report to Congress on agency compliance with the act.FY 2005 Report to Congress on Implementation of The Federal Information Security Management Act of 2002 In FY 2008, federal agencies spent $6.2 billion securing the government’s total information technology investment of approximately $68 billion or about 9.2 percent of the total information technology portfolio.FY 2008 Report to Congress on Implementation of The Federal Information Security Management Act of 2002 https://store.theartofservice.com/the-security-management-toolkit.html
292
Federal Information Security Management Act of 2002 - Purpose of the act 1 FISMA assigns specific responsibilities to Government agency#Government agencies in the United States|federal agencies, the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) in order to strengthen information system security. In particular, FISMA requires the head of each agency to implement policies and procedures to cost-effectively reduce information technology security risks to an acceptable level. https://store.theartofservice.com/the-security-management-toolkit.html
293
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 In accordance with FISMA, National Institute of Standards and Technology|NIST is responsible for developing standards, guidelines, and associated methods and techniques for providing adequate information security for all agency operations and assets, excluding national security systems https://store.theartofservice.com/the-security-management-toolkit.html
294
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 * Information Security Automation Program (ISAP) https://store.theartofservice.com/the-security-management-toolkit.html
295
Federal Information Security Management Act of 2002 - Implementation of FISMA 1 * National Vulnerability Database (NVD) – the U.S. government content repository for ISAP and Security Content Automation Protocol|SCAP. NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g., FISMA) https://store.theartofservice.com/the-security-management-toolkit.html
296
Federal Information Security Management Act of 2002 - Inventory of information systems 1 The identification of information systems in an inventory under this subsection shall include an identification of the interfaces between each such system and all other systems or networks, including those not operated by or under the control of the agency https://store.theartofservice.com/the-security-management-toolkit.html
297
Information Security Management Certified Professional 1 'Information Security Management Certified Professional (ISMCP) ' is a designation awarded by INFINIDOX. https://store.theartofservice.com/the-security-management-toolkit.html
298
Information Security Management Certified Professional 1 Relevant information security background, both theoretical and practical, is required to pass the ISMCP http://www.infinidox.com/?a=ismcp examination. https://store.theartofservice.com/the-security-management-toolkit.html
299
Information Security Management Certified Professional 1 * Security administration https://store.theartofservice.com/the-security-management-toolkit.html
300
Information Security Management Certified Professional 1 * Communication systems security https://store.theartofservice.com/the-security-management-toolkit.html
301
Information Security Management Certified Professional 1 * Applications security https://store.theartofservice.com/the-security-management-toolkit.html
302
Information Security Management Certified Professional 1 Candidates are recommended to have a minimum of 5 years of experience in one or more of the six topic areas that the exam covers. https://store.theartofservice.com/the-security-management-toolkit.html
303
FCAPS - Security management 1 Security management is the process of controlling access to assets in the network. Data security can be achieved mainly with authentication and encryption. Authorization to it configured with Operating system|OS and Database management system|DBMS access control settings. https://store.theartofservice.com/the-security-management-toolkit.html
304
FCAPS - Security management 1 Security management functions include managing network authentication, authorization, and auditing, such that both internal and external users only have access to appropriate network resources https://store.theartofservice.com/the-security-management-toolkit.html
305
Total Security Management 1 'Total Security Management' ('TSM') is the business practice of developing and implementing comprehensive risk management and security practices for a firm’s entire value chain https://store.theartofservice.com/the-security-management-toolkit.html
306
Total Security Management 1 TSM encourages companies to manage security initiatives as investments with a measurable return and seeks to transform security from a net cost to a net benefit https://store.theartofservice.com/the-security-management-toolkit.html
307
Total Security Management - Formulation 1 The concept of Total Security Management was first introduced in the book Securing Global Transportation Networks: A Total Security Management Approach, published by McGraw Hill in 2006 https://store.theartofservice.com/the-security-management-toolkit.html
308
Total Security Management - Formulation 1 According to Dr https://store.theartofservice.com/the-security-management-toolkit.html
309
Total Security Management - Formulation 1 The TSM approach built upon scholarly research on the issue that stressed the importance of security as a key component of the supply chain https://store.theartofservice.com/the-security-management-toolkit.html
310
Total Security Management - Relation to Total Quality Management 1 The TSM name borrows from the management concept Total Quality Management (TQM), an approach made famous by the work of W https://store.theartofservice.com/the-security-management-toolkit.html
311
Total Security Management - Relation to Total Quality Management 1 I suspect that there are many professionals in the transportation industry today who may not endorse security management as a core business function that can create value https://store.theartofservice.com/the-security-management-toolkit.html
312
Total Security Management - Companies employing TSM 1 A company using the TSM methodology is meant to be able to establish a framework of focus points, metrics and feedback loops in order to elevate risk management from a non-core objective to an essential business function https://store.theartofservice.com/the-security-management-toolkit.html
313
Total Security Management - Companies employing TSM 1 Securing Global Transportation Networks details case studies of many large companies that benefited from the implementation of aspects of the TSM approach, including FedEx, Home Depot, Hutchison Port Holdings, Maersk, Procter Gamble, and Target Corporation|Target, amongst others.McGraw Hill, Book Release, October 2006, http://www.manhattan- institute.org/securing_networks/, 5/5/10 https://store.theartofservice.com/the-security-management-toolkit.html
314
Total Security Management - Criticism 1 There are some useful ideas in the book, but the overall program may be too ambitious for many corporations to realistically consider,” writes Ross Johnson in a 2007 Security Management review.Ross Johnson, Security Management: Book Review, October 2007, http://www.securitymanagement.com/articl e/securing-global-transportation-networks- total-security-management-approach, 5/5/10 https://store.theartofservice.com/the-security-management-toolkit.html
315
Total Security Management - Other developments 1 33-9089, 2009, http://www.sec.gov/rules/final/2009/33- 9089.pdf, 5/5/10 In January 2010, ISO 28000 (ISO/PAS 28000 – Specification for security management systems for the supply chain) was updated to include an explicit reference to the Plan-Do-Check-Act model of quality management popularized by Deming.Continuity Compliance, ISO 28002 – What’s The Buzz About?, October 2009, http://www.continuitycompliance.org/informati on/organizational-resiliency/iso-28002-whats- the-buzz-about/, 5/5/10 https://store.theartofservice.com/the-security-management-toolkit.html
316
For More Information, Visit: https://store.theartofservice.co m/the-security-management- toolkit.html https://store.theartofservice.co m/the-security-management- toolkit.html The Art of Service https://store.theartofservice.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.