The confidentiality, authenticity, integrity and availability of the organization data and IT services is ensured by the Information Security Management (IST). The responsible use of the organization’s information resources and the appropriate management of the information security risks is ensured by IST. The process owner of this process is Information Security Manager.
Information security is considered to be met when:
To meet the business needs and to be appropriate, all the areas of security are covered by the ISM security policies, which include the following policies:
The complete process of the Information Security Management (ISM) is shown below:
The key elements of the ISM framework include:
The objective of Control element is to:
Based on the requirements of the organization, the appropriate security measures are devised and recommended by this element.
In order to underpin the security policy the appropriate procedures, tools and controls are ensured to be in place by this element.
The objective of Evaluation element is to:
The objective of Maintain element is to:
The occurrence of the security incidents are prevented by this element. This is done by some of the measures like access rights, authorization, identification, and authentication and access control.
Any possible damage is minimized by this element.
This element helps in detecting any security incident at the earliest.
The repetition of the security incident if any is counteracted by this element.
The damage is repaired as soon as possible by this element.
ITIL Concepts Related Interview Questions
|ITIL Configuration Management Interview Questions||Project Management Interview Questions|
|Change Management Interview Questions||ITIL Concepts Interview Questions|
|Strategic Planning for Project Management Interview Questions||PRINCE Interview Questions|
|Project Manager Interview Questions||Project Coordinator Interview Questions|
|ITIL Service Transition Interview Questions|
Itil Concepts Tutorial
Overview Of Configuration Management
Gathering And Analyzing Requirements
Determining Scope, Span, And Granularity
Customizing The Configuration Management Process
Planning For Data Population
Putting Together A Useful Project Plan
Choosing The Right Tools
Implementing The Process
Populating The Configuration Management Database
Choosing And Running A Pilot Program
Communication And Enterprise Roll Out
Building A Configuration Management Team
The Many Uses For Configuration Information
Measuring And Improving Cmdb Accuracy
Improving The Business Value Of Configuration Management
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.