Security Management System (SMS)

Authored by: Shahida , Khalid Hussain Usmani , Mamoona Humayun

Information Security Handbook

Print publication date:  February  2022
Online publication date:  February  2022

Print ISBN: 9780367365721
eBook ISBN: 9780367808228
Adobe ISBN:

10.1201/9780367808228-10

 Download Chapter

 

Abstract

In the current era of information technology, most companies, industries, and government sectors have already automated their systems using computer networks. These networks primarily store the organization's data for further processing and later use. In the information security context, which is the ultimate insurance of the information, it is the core matter of interest to protect and zealously preserve the information; at the same time, the availability of the information when needed is a greater challenge. So, the network managers need a system to orientate facilities in place to cover data and network resources. This chapter explores the security management system (SMS), which is a comprehensive set of strategies and procedures based on the risk management and risk assessment components; it looks into all critical business processes by analyzing the associated risks. Afterward, it executes the controls to prevent information from internal and external attacks (threats) and ensures that information is well safeguarded, and risk is absolved. These threats include not only the cause of someone with malicious targets, but also the accidental events like someone who downloads a Trojan or involuntarily deletes or moves critical files. The periodic check is the final step to adjust and organize the policies in the place they need to be, according to new technologies and new ways to save data damage externally. The essence of the implemented system (e.g. ISO/IEC 27001) based on the organizational management model Plan-Do-Check-Act (PDCA) framework, which embeds cloudy features to achieve the effectiveness and efficiency throughout the necessary procedures.

 Cite
Search for more...
Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.