StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information security management framework - Research Paper Example

Cite this document
Summary
So that information can be protected, organizations and businesses are supposed to execute regulations and controls concerned with safeguarding of information as well as the systems used for the storage and processing the information. This is typically achieved through executing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Information security management framework
Read Text Preview

Extract of sample "Information security management framework"

Topic: Information Security Management Framework Security Policies, Standards and Guidelines So that information can be protected, organizations and businesses are supposed to execute regulations and controls concerned with safeguarding of information as well as the systems used for the storage and processing the information. This is typically achieved through executing information security policies along with standard and guidelines. In this context, security policies are usually written documents, which are supposed to lay out the precise requirements or rubrics that must be adhered to by the employees.

It is an overall description of the permissible and impermissible conducts of the employees in the workplace concerning how information is handled. In regards to the security of information and networks, policies typically cover a single aspect such as the acceptable utilization of computing facilities in a learning institution (Singh, 2007).On the other hand, standards are thorough and comprehensive statements of the aspects that members of an organization are supposed to participate in in order to abide by the set policies.

They may exist in the form of requirements specific to systems or procedures, which are supposed to be adhered to by everyone. For instance, the employees may wish to use their personal mobile devices in the workplace; in this case, the standards set for the connection of the mobile devices to the network run by the organization must be adhered to precisely (Laet & Schauwers, 2005). Additionally, guidelines are literally groups of system or procedural specific recommendations that govern nest practices but are not must-follow controls.

Nevertheless, reference to standards and guidelines is seen as an efficient and effective aspect of a good security policy. All the documents listed have varying target audiences in a company and thus they are not supposed to be combined into a single document. Rather, there should be a number of documents, which will collectively develop the concept of an information security policy framework thereby making the security policy the most important document overall.ReferencesLaet, G., & Schauwers, G. (2005). Network security fundamentals.

Indianapolis, Ind.: Cisco.Singh, B. (2007). Network security and management. New Delhi: Prentice-Hall of India.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security management framework Research Paper - 2”, n.d.)
Information security management framework Research Paper - 2. Retrieved from https://studentshare.org/information-technology/1689015-information-security-management-framework
(Information Security Management Framework Research Paper - 2)
Information Security Management Framework Research Paper - 2. https://studentshare.org/information-technology/1689015-information-security-management-framework.
“Information Security Management Framework Research Paper - 2”, n.d. https://studentshare.org/information-technology/1689015-information-security-management-framework.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information security management framework

Explain how coso framework can be applied in a computerised environment

How "Coso framework" Can be Applied in a Computerised Environment Subject: Professor: February 9, 2012 The COSO framework fits comfortably well in the computerised United Kingdom organisations' environments.... hellip; The research delves on the necessity to implement the COSO framework in all United Kingdom entities.... The COSO framework enhances the internal control activities' reduction of fraudulent and erroneous reports....
3 Pages (750 words) Essay

Security Framework in the Modern World

Borders have relevance in tackling information security, and looking at borders, domains of various countries interact because they do not have borders, therefore, the domains of a nation will be related to the nation's willingness to assert sovereignty in the domains.... In China, there is a severe internet information security because there is a leakage of information and this requires protection of privacy and other personal data should be strengthened because internet abuse has become unscrupulous....
5 Pages (1250 words) Research Paper

Information Security

Determining an appropriate level of information security is often complicated by the fact that different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities.... Security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context....
4 Pages (1000 words) Essay

PHP Libraries and Frameworks

There exists numerous development languages and practically every language has a framework of sorts.... The server-side scripting languages have realised more advanced development in terms of framework.... For instance, PHP has several frameworks; Codeigniter, Zend framework etc.... Traditionally, the software management process has been focussed on basic code writing and development of modules....
6 Pages (1500 words) Essay

Impact of Legislation on Organizations

Points of Analysis The procedures highlighted an analysed below necessitate the need for universal intelligence about risk and security management of data and information.... The… The points of analysis for this particular case retrieves its items from the Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security Impact of Legislation on Organizations al Affiliation: Introduction The organization under review with regards to its information security program is the Department of Health and Human Services....
2 Pages (500 words) Essay

National Response Framework

This is why National Response framework plays a vital role in combating terrorism.... It's pegged on flexible, scalable and adaptable concepts identifiable by the national incident management system to align key roles and responsibilities across the nation.... Terrorism is a global problem that requires advanced preparedness and management....
4 Pages (1000 words) Assignment

Microsoft's Security Measures

A comprehensible security management system that manages numerous security components across multiple devices is extremely crucial to the company.... The reason why most companies consider using sophisticated security settings is that the existing security management solutions are not helping such firms to meet their business needs.... information security is an important aspect of modern human activities and processes due to the increased use of technology and networks, which pose threats to private and confidential data or information....
7 Pages (1750 words) Case Study

Disaster Recovery

nbsp;Security structure addresses internal, external and specialized framework security.... The discriminating framework of any nation comprises amazingly composite, regulating toward oneself and cyber-based assets which is indispensable for the country's money related framework and supervision.... For tending to cyber-attacks there must be a security structure that will address internal, external and specialized framework security....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us