M1U1: Introduction to IT Security Management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

"Good IT Security is often based around standards"

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

IT environment

consists of a multitude of hardware, network and software components

2
New cards

IT infrastructure

can be on premises; in the cloud or on a hybrid platform that integrates both

3
New cards

IT managers

  • monitor and govern IT systems to ensure they’re always available and function reliably

  • Determining business requirements for IT systems

  • Managing IT budgets and costs

  • Monitoring safety and compliance

  • Controlling system and network security

  • Implementing new software, hardware, and data systems

  • Providing technical or help desk support

4
New cards

IT Security Management (ITSM)

  • refers to the monitoring and administration of an organization’s information technology systems that are used to secure their information and data

  • intends to guarantee the Confidentiality, Integrity, and Availability of an organization’s data, information and IT services

5
New cards

IT Security Management Sub-Processes

  • Designing security controls

  • Security testing

  • Managing security incidents

  • Security review

6
New cards

Designing security controls

To guarantee the CIA of an organization’s data

7
New cards

Security Testing

All security mechanisms are subjected to regular testing

8
New cards

Managing security incidents

To identify and fight intrusions and attacks and also to minimize damages incured

9
New cards

Security review

To review whether the safety measures and processes are still in accordance with risk perceptions

10
New cards

IT Security Management Roles and Position

  • Chief Information Officer (CIO)

  • Chief Information Security Officer (CISO)

11
New cards

Chief Information Officer (CIO)

  • Determines IT strategies and goals for the business and ensure they’re implemented

  • Many believe their roles will evolve in the next two to three years

  • Implements meaningful digital change through the creation of new tools, solutions, and business models

12
New cards

Chief Information Security Officer (CISO)

a senior-level executive who oversees an organization’s information, cyber, and technology security

13
New cards

CIO

generalists

14
New cards

CISO

focused on security

15
New cards

Other Related Positions

  • Security Administrator

  • Cloud Security Manager

  • Threat Intelligence Manager

16
New cards

Security Administrator

  • responsible for the day-to-day management of security technology systems

  • They install, administer, and troubleshoot an organization’s security solutions, ensuring that the infrastructure is protected against unauthorized access or compromise

17
New cards

Cloud Security Manager

reflects the shift towards cloud-based infrastructure

18
New cards

Threat Intelligence Manager

focusing or proactive identification and mitigation of cyber threats