Categories: ITIL Certification

What is ITIL IT Security management? | Article 12

In my previous articles I have given multiple practices which are useful for ITIL v4 foundation examination. Those are IT change management,Incident management,continual improvement management.service desk e.t.c. Those are very important topics for ITIL v4 examination .With those topics some more practices are also very important in ITIL. I would like to discuss one practice in detail in this article. ITIL IT security management practice is another important practice in ITIL v4. I will not go through the details of this practice but give you information whatever required in ITIL v4 examination. The purpose statement is very important for ITIL v4 examination.

Article will contain :

What is IT security and IT security management purpose statement?

Purpose of IT security management

What is ITIL IT security Management ?

In this section I would like to give you information about IT security management in detail. The IT security management is nothing but fitting security in IT in organizational level.

The Purpose statement for IT security management :

To protect the information needed by the organization

Keyword to remember :

To protect the information

Features of IT Security :

Confidentiality

We need to ensure that we require to check the confidentiality of the data.

Example : The password should be encrypted.

Integrity

We need to keep the integrity for applications.

Availability

We need to make sure that the availability of service in business hours.

Authentication

There should be the proper authentication mechanism

Non-Repudiation

It is assurity that someone can not deny something.

Different phases of IT security management :

There are following 3 phases of IT security management.

1.Prevention

2.Detection

3.Correction

IT security phases

Prevention : In this phase user needs to prevent the security threats.

Example : Any brute forge attack or ciber attacks needs to be prevented.

Detection : Detect the attacks on system.

Example :

If there is any hacking attack user needs to check the logs and detect these kind of attacks before big impact.

Correction : In this phase user needs to correct the security attacks by following specified approach.

These are above the phases of IT security management.

Amit S

Oracle Consultant with vast experience in Oracle BI and PL/SQL Development. Amiet is the admin head of this website who contributes by preparing tutorials and articles related to database technologies. He is responsible to manage the content and front-end of the website.

Share
Published by
Amit S

Recent Posts

The Essential Guide to Cryptocurrency Exchange Platform Development for Beginners and Beyond

Introduction Cryptocurrencies took the world by storm, setting up a new financial system and breaking…

5 months ago

Top 20 System Administrator Interview Questions and answers

In my previous article I have given Top 20 technical support interview questions with its…

8 months ago

Desktop Support Scenario Based Interview Questions

In my previous articles I have given 15 most asked desktop support interview questions with…

8 months ago

How Do Business Analysts Use SQL for Their Needs?

A business analyst is someone who is versed in processes of data analysis used for…

8 months ago

Top 15 Control-M Interview Questions with Answers

In my previous article I have already given top questions and answers for Desktop support…

8 months ago

Top 20 SQL Interview Questions for Production Support

In my previous article I have given unix production support interview questions and answers. In…

8 months ago