Chapter 3 Reviewer - Information Security Management
Chapter 3 Reviewer - Information Security Management
Purpose of ISMS:
ISO/IEC 27001:
o Based on five core functions: Identify, Protect, Detect, Respond, and Recover.
Risk Management: A process to identify, assess, and prioritize risks to mitigate their impact on
the organization.
1. Risk Assessment:
2. Risk Mitigation:
Data Protection Policy: Guides the protection of personal and sensitive data.
Chief Information Security Officer (CISO): Leads the organization’s security strategy and
oversees ISMS implementation.
Incident Response Team: Specializes in identifying, containing, and recovering from security
incidents.
All Employees: Expected to comply with security policies and report any suspicious activity.
Control Types:
o Preventive Controls: Aim to prevent security incidents (e.g., firewalls, access controls).
o Detective Controls: Identify and detect incidents when they occur (e.g., intrusion
detection systems).
o Corrective Controls: Restore systems after a security breach (e.g., backups, disaster
recovery).
Categories of Controls:
o Administrative Controls: Define roles, policies, and procedures (e.g., training, security
policies).
Incident Management: Process to detect, respond to, and recover from security incidents.
1. Preparation: Develop incident response policies, train staff, and establish protocols.
4. Eradication: Eliminate the root cause of the incident and remove affected components.
Key Components:
Monitoring: Ongoing observation of network and data to detect abnormal activities and
potential threats.
Auditing: Periodic examination of security practices, compliance with policies, and control
effectiveness.
Security Metrics: Quantifiable measurements used to assess security effectiveness (e.g., number
of incidents, time to detect/resolve threats).