Managing Information Security: Chapter 2. Security Management Systems

Managing Information Security: Chapter 2. Security Management Systems
ISBN-10
0128073888
ISBN-13
9780128073889
Series
Managing Information Security
Category
Computers
Pages
372
Language
English
Published
2013-08-21
Publisher
Elsevier Inc. Chapters
Author
James T. Harmening

Description

Today, when most companies and government agencies rely on computer networks to store and manage their organizations’ data, it is essential that measures are put in place to secure those networks and keep them functioning optimally. Network administrators need to define their security management systems to cover all parts of their computer and network resources. With a plethora of storage devices, including iPads, Android Tablets, USB drives, watches, televisions, Digital Video Recorders, smart phones, apple T.V. appliances, Xbox’s, and household appliances, the management becomes even more difficult. This chapter focuses on security management systems: Which are sets of policies put place by an organization to maintain the security of their computer and network resources. These policies are based on the types of resources that need to be secured, and they depend on the organization. Some groups of policies can be applied to entire industries; others are specific to an individual organization. A security management system starts as a set of policies that dictate the way in which computer resources can be used. The policies are then implemented by the organization’s technical departments and enforced. This can be easy for smaller organizations but can require a team for larger international organizations that have thousands of business processes. Either way, measures need to be put in place to prevent, respond to, and fix security issues that arise in an organization. Standards that were in place ten years ago may not be adequate for current business practices. As an example a strong password may have included less than 8 characters, while modern computers can easily break the password utilizing brute force or rainbow table methods.

Other editions

Similar books

  • Managing Information Security Risks: The OCTAVE Approach
    By Christopher J. Alberts, Audrey J. Dorofee

    Web Security : How Much Is Enough ? " Datamation ( January 1997 ) . Rubin , A. D .; Geer , D .; and Ranum , M. Web Security Sourcebook . New York : John Wiley and Sons , 1997 . Rubin , Aviel and Geer , Daniel . " A Survey of Web ...

  • Managing Information Security
    By John R. Vacca

    Sheila Frankel, Bernard Eydt, Les Owens Karen, Scarfone, NIST Special Publication 800À97: “Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i,” Recommendations of the National Institute of Standards and Technology, ...

  • Managing Risk and Information Security: Protect to Enable
    By Malcolm Harkins

    This book compels information security professionals to think differently about concepts of risk management in order to be more effective.

  • A Practical Guide to Managing Information Security
    By Steve Purser

    [ 4 ] Wilson , M. , et al . , " Information Technology Security Training Requirements : A Role- and Performance - Based Model : Part 1 — Document , " September 2003 , http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf .

  • Managing the Human Factor in Information Security: How to win over staff and influence business managers
    By David Lacey

    The explosion in social networking and mobile computing is intensifying this problem. For the first time, this book brings together theories and methods which will help you to change and harness people's security behaviour.

  • Management of Information Security
    By Michael E. Whitman, Herbert J. Mattord

    Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.

  • Management of Information Security
    By Michael E. Whitman, Herbert J. Mattord

    Designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security, this work includes extensive end-of-chapter pedagogy to reinforce concepts as they are ...

  • How to Cheat at Managing Information Security
    By Mark Osborne

    Securing a windows Server 2003 enterprise network is hardly a N tW k small undertaking, but it becomes quite manageable if you approach it in an Nel. ork organized and systematic way. This includes configuring software, services, ...

  • Information Security Management Principles
    By Andy Taylor

    This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources."

  • Managing Information Systems Security and Privacy
    By Denis Trcek

    This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles.