About This Chapter
Information Security Management - Chapter Summary
For an overview of information security management basics, check out this collection of fun and simple lessons. As you work through the lessons on your desktop, laptop, smartphone or tablet, you'll review information security systems and best practices, as well as the functions of mobile device security, database security and information security management. The chapter includes short quizzes to help you reinforce important terms and concepts from the lessons. You can access the chapter whenever you have free time to study, and when you're finished, you should be able to:
- Recognize best practices in information security
- Compare types of information security
- Describe the applications of security management systems
- Explain the purpose and functions of database security management
- Evaluate mobile device security management software
- Assess systems of information security management
1. What is Information Security? - Definition & Best Practices
In this lesson, you'll learn about the basic principles of information security and the best practices for keeping confidential information in your organization where it belongs.
2. Types of Information Security
In this lesson, we will discuss information security and cover the eight different types of security. The arrangement of information security into these different types aligns with one of the most common information security certifications, CISSP.
3. What is Security Management? - Systems & Applications
Information technology (IT) security breaches are becoming more and more common these days. In this lesson, you'll learn about IT security management as it applies to systems and applications.
4. Database Security Management
For data to be secure all the systems around the data should be secured. In this lesson, we'll learn about the threats to database systems today and the processes and procedures used to protect the confidentiality of a database system.
5. Mobile Device Security Management: Software & Best Practices
While IT security professionals may prefer that their employees' devices never leave the office, that simply is not practical. In this lesson we look at the importance of mobile device security management.
6. Information Security Management Systems
Securing information is extremely important in today's day and age. In this lesson, we'll take a look at information security, what it is, what information security management is, and the systems that enforce it.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 331: Cybersecurity Risk Analysis Management course
- Information Security Threats
- Cybersecurity Threats
- Computer Security Laws
- Strategic Planning & Governance
- Cybersecurity Policies
- Cybersecurity Program Development & Implementation
- Security Management Models & Practices
- Identifying & Assessing Cybersecurity Risks
- Controlling Cybersecurity Risk
- Cybersecurity Safeguards
- Incident Response in Cybersecurity
- Cybersecurity Contingency Planning