O'Reilly logo

IT Service Management - A guide for ITIL Foundation Exam candidates by Aidan Lawes, Ernest Brewster, Richard Griffiths, John Sansbury

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

18 INFORMATION SECURITY MANAGEMENT AND ACCESS MANAGEMENT (SD 4.7, SO 4.5)

INTRODUCTION AND SCOPE

The security of data and information is of vital importance to any organisation and it is therefore a business decision as to what information should be protected and to what level. The business’s approach to the protection and use of data should be contained in a security policy to which everyone in the organisation should have access and the contents of which everyone should be aware. The system in place to enforce the security policy and ensure that the business’s IT security objectives are met is known as the information security management system (ISMS). Information security management supports corporate governance by ensuring that information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required