Andes
Thank you so much
The aim of this unit is to provide an understanding of IT security management to enable learners to manage organisational security.
This Unit 48 IT Security Management deals with the management of an organisation’s security. This involves controlling access, regulating use, implementing contingency plans and devising security policies and procedures. Breaches in security may be caused by human actions, accidental, malicious or negligent, or through incorrect installation, configuration or operation. Physical security management involves regulating the access to the computers, network devices, databases etc by physical means such as securing buildings from unauthorised access, prevention of loss or damage due to weather, fire and water ingress. Consideration must also be given to alternative sources of supply of hardware, software, power, telecommunications and suitable buildings to allow the organisation to continue after a disaster has occurred (disaster recovery planning). Human resource management is also an important topic as regards the management of security. It allows for the selection of roles and responsibilities and the associated documentation of organisational procedures based on current legislation and standards.
Alexander D et al – Information Security Management Principles (BCS, 2008) ISBN-13: 978- 1902505909
Beekman G – Computer Confluence Complete: and Student CD (Prentice Hall, 2005) ISBN 1405835796
Tipton H – Information Security Management Handbook: v. 4 (Auerbach Pubs, 2010) ISBN-10: 1439819025
www.acm.org – Association of Computing Machinery
www.bcs.org – British Computer Society
www.bsa.org.uk – Business Software Alliance
www.fast.org.uk – Federation Against Software Theft
www.ico.gov.uk – Information Commissioners Office