Search in ISMS Guides

Google
 

Thursday, August 2, 2007

Implement security management with these six steps

by Change Tech Solutions Inc. | Oct 8, 2003

Takeaway: With security one of their highest priorities, executives are searching for effective techniques to deliver maximum security while simplifying security management. This outline explains what you'll need to focus on.


Security management deals with how system integrity is maintained amid man-made threats and risks, intentional or unintentional. Intentional man-made threats include espionage, hacks, and computer viruses. Unintentional threats include those due to accidents or user ignorance of the effects of their actions. Security management ranges from identification of risks to determination of security measures and controls, detection of violations, and analysis of security violations. I'll describe the steps involved in security management and discuss factors critical to the success of security management.

Step 1: Determine and evaluate IT assets
Step 2: Analyze risk
Step 3: Define security practices
Step 4: Implement security practices
Step 5: Monitor for violations and take corresponding actions
Step 6: Reevaluate IT assets and risks

No comments: