Business Guide
simplicable technology guide   »  security   »  security management overview

Information Security Management in 90 Seconds

        posted by , February 12, 2011

Information Security Management (ISM) is an increasingly important part of corporate governance. In fact, most large companies are now legally required to report their information security status to shareholders (ie. Sarbanes-Oxley Act of 2002 etc..).

What is Information Security?

Information Security ensures data confidentiality, control, integrity, authenticity, availability and utility.

information security management


Restricting access to data. Example: new product designs should be hidden from competitors.


Possession of data. Example: loss of a corporate laptop — if the hard drive is encrypted confidentiality has been maintained but control has been lost.


Data correctness. Example: banks must calculate and store account balances correctly.


Confirming the source of data. Example: is an email really from the company CEO?


Timely access to data. Example: necessary information must be available to staff to do their jobs (denial of service attacks seek to disrupt data availability).


Data must be in a useful format. Example: encrypted data is secure but not usable.

3 Shares Google Twitter Facebook

Related Articles

Enterprise Architecture
How to architect an organization.

The 90 second version of TOGAF — a popular enterprise architecture framework.

IT security

A guide to information security including cheat sheets, best practices and checklists.

Recently on Simplicable

Build Your Own Enterprise SOA Marketplace

posted by John Spacey
3 approaches to SOA reuse.

3 Big Data Bullies

posted by Anna Mar
Like any powerful new tool, big data can either be used to improve life or to make life worse.

IT ROI is Fading Fast as a Measure of IT Success

posted by Anna Mar
Somebody tell the CFO — IT ROI has gone the way of the dinosaurs.

9 ITIL Implementation Challenges

posted by Anna Mar
ITIL implementation is no cakewalk. ITIL impacts your entire organization — your business, your IT department and your inflight projects.


about     contact     sitemap     privacy     terms of service     copyright