Information Security Management

The purpose of the Information Security Management process is to align IT security with business security and ensure that information security is effectively managed in all service and
Service Management activities, such that:
• Information is available and usable when required (availability)
• Information is observed by or disclosed to only those who have a right to know (confidentiality)
• Information is complete, accurate and protected against unauthorized modification (integrity)
• Business transactions, as well as information exchanges, can be trusted (authenticity and nonrepudiation).

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s