Reply To: OCU C)ISSO A Discussion Lesson 02
Information security management is about a company’s success through identification, maintenance of critical information, and systems that are assured to be protected, reliable, and usable. Some of the basic concepts include confidentiality, integrity, and availability, also known as the CIA Triad. Confidentiality refers to ensuring that only authorized people have access to information. Integrity pertains to protecting information from unauthorized modification and thus maintaining its accuracy and trustworthiness. Availability refers to assuring that information and systems are accessible when required to support business operations. Each security decision is based on these three principles to help the company maintain smooth, secure operations.
Another important ingredient in security management is strong policy, effective controls, and continuous maintenance. A security policy is a formal set of rules that defines the expectations for employee information handling. It builds uniformity within the organization and lays the groundwork for accountability. Controls are countermeasures used to mitigate risk. Examples include administrative controls such as training and procedures, technical controls like firewalls and encryption, and physical controls such as secure access points. Maintenance is also equally important because security is never a one-time deal. Systems must be monitored, updated, and reviewed to ensure that controls continue being effective against new threats. When these elements all interact, the organization will be able to protect its assets, minimize the occurrence of incidents, and ensure long-term success.