From the course: Cloud Security Operations by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Information security management
From the course: Cloud Security Operations by Pearson
Information security management
In this short lesson, we're going to remind ourselves of why we're here, okay, information security management. The purpose of this practice is common sense. It's to protect the information needed by the organization to conduct its business by delivering confidentiality, integrity, availability, authentication, and non-repudiation. Remember, we have three main categories of controls. Administrative or managerial, technical and operational, and physical. And we have five types of controls. Preventative, deterrent, detective, corrective, and compensating. You should be familiar with all of these. There are several processes and procedures involved with information security management. There is an Information Security Incident Management process, a Risk Management process, a Control, Review, and Audit process, and an Identity and Access Management process. There is also Event Management. There is procedures for Penetration Testing, Vulnerability Scanning, and more. And finally…
Contents
-
-
-
-
(Locked)
Configuration and change management7m 26s
-
(Locked)
Continuity management2m 27s
-
(Locked)
Information security management1m 21s
-
(Locked)
Service-level management3m 58s
-
(Locked)
Incident and problem management7m 51s
-
(Locked)
Release and deployment management2m 47s
-
(Locked)
Availability management2m 26s
-
(Locked)
Capacity management1m 25s
-
(Locked)
Security operations centers (SOC)9m 5s
-
(Locked)
Intelligent security control monitoring15m 26s
-
(Locked)
Vulnerability assessment3m 20s
-
(Locked)
-
-
-