Categories: ITIL Certification

What is ITIL IT Security management? | Article 12

In my previous articles I have given multiple practices which are useful for ITIL v4 foundation examination. Those are IT change management,Incident management,continual improvement management.service desk e.t.c. Those are very important topics for ITIL v4 examination .With those topics some more practices are also very important in ITIL. I would like to discuss one practice in detail in this article. ITIL IT security management practice is another important practice in ITIL v4. I will not go through the details of this practice but give you information whatever required in ITIL v4 examination. The purpose statement is very important for ITIL v4 examination.

Article will contain :

What is IT security and IT security management purpose statement?

Purpose of IT security management

What is ITIL IT security Management ?

In this section I would like to give you information about IT security management in detail. The IT security management is nothing but fitting security in IT in organizational level.

The Purpose statement for IT security management :

To protect the information needed by the organization

Keyword to remember :

To protect the information

Features of IT Security :

Confidentiality

We need to ensure that we require to check the confidentiality of the data.

Example : The password should be encrypted.

Integrity

We need to keep the integrity for applications.

Availability

We need to make sure that the availability of service in business hours.

Authentication

There should be the proper authentication mechanism

Non-Repudiation

It is assurity that someone can not deny something.

Different phases of IT security management :

There are following 3 phases of IT security management.

1.Prevention

2.Detection

3.Correction

IT security phases

Prevention : In this phase user needs to prevent the security threats.

Example : Any brute forge attack or ciber attacks needs to be prevented.

Detection : Detect the attacks on system.

Example :

If there is any hacking attack user needs to check the logs and detect these kind of attacks before big impact.

Correction : In this phase user needs to correct the security attacks by following specified approach.

These are above the phases of IT security management.

Amit S

Oracle Consultant with vast experience in Oracle BI and PL/SQL Development. Amiet is the admin head of this website who contributes by preparing tutorials and articles related to database technologies. He is responsible to manage the content and front-end of the website.

Share
Published by
Amit S

Recent Posts

What is Root Cause Analysis (RCA) With real examples

In my previous article I have given details about application support engineer day to day…

1 month ago

Application Support Engineer Day to day responsibilities

In my previous articles I have given the roles and responsibilities of L1,L2 and L3…

1 month ago

What is mean by SLA ( Service Level Agreement) with Examples?

In my previous articles i have given the hierarchy of production support in real company…

1 month ago

What is Production support Hierarchy in organization?

In this article i would like to provide information about production support organization structure or…

1 month ago

What are roles and responsibilities for L3 Support Engineer?

In my previous article I have given roles for L1 and L2 support engineer with…

1 month ago

What are roles and responsibilities of L2 Engineer?

I have started this new series of how to become application support engineer. This article…

1 month ago