Difference between revisions of "Information Security Team"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
 
| '''1.''' Information Security Team is responsible for developing security policies to ensure that the technological aspects of the organization are protected.  
 
| '''1.''' Information Security Team is responsible for developing security policies to ensure that the technological aspects of the organization are protected.  
 
[[File:IT Team InfoSec Team Cyber Security Team V2.png|thumb|right|300px|'''Relation between IT Team, InfoSec Team and Cyber Security Team''']]
 
[[File:IT Team InfoSec Team Cyber Security Team V2.png|thumb|right|300px|'''Relation between IT Team, InfoSec Team and Cyber Security Team''']]
Related Term: [[Information_Technology_Security_Team|Information Technology Security Team]]; [[Cyber_Security_Team|Cyber Security Team]].
+
'''Related Term''': [[Information_Technology_Security_Team|Information Technology Security Team]]; [[Cyber_Security_Team|Cyber Security Team]].
  
 
'''Notes (1)''': The main focus of the team is on the [[Confidentiality_of_Data|confidentiality]], [[Integrity_of_Data|integrity]], and [[Availability_of_Data|availability]] (CIA) of the data.
 
'''Notes (1)''': The main focus of the team is on the [[Confidentiality_of_Data|confidentiality]], [[Integrity_of_Data|integrity]], and [[Availability_of_Data|availability]] (CIA) of the data.
 
+
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
 +
{{Template:BLCoursesBanner}}
 
{{Bcm Institute Source}}  
 
{{Bcm Institute Source}}  
 
|}
 
|}
 
+
&nbsp;
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
 
'''2.''' Information Security team is responsible for ensuring its organisation's and its clients' information security.<br/> '''Source:''' (Trayport, 2017)<br/> <br/> '''3.''' The mission of the Information Security team, is to protect the organisation's electronic data and information technology systems from information security threats while securing and protecting the confidentiality of their stakeholders' information.<br/> '''Source:''' (Snyder, 2017)
 
'''2.''' Information Security team is responsible for ensuring its organisation's and its clients' information security.<br/> '''Source:''' (Trayport, 2017)<br/> <br/> '''3.''' The mission of the Information Security team, is to protect the organisation's electronic data and information technology systems from information security threats while securing and protecting the confidentiality of their stakeholders' information.<br/> '''Source:''' (Snyder, 2017)
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 04:09, 3 November 2020

1. Information Security Team is responsible for developing security policies to ensure that the technological aspects of the organization are protected.
Relation between IT Team, InfoSec Team and Cyber Security Team

Related Term: Information Technology Security Team; Cyber Security Team.

Notes (1): The main focus of the team is on the confidentiality, integrity, and availability (CIA) of the data.







(Source: Business Continuity Management Institute - BCM Institute)

 

2. Information Security team is responsible for ensuring its organisation's and its clients' information security.
Source: (Trayport, 2017)

3. The mission of the Information Security team, is to protect the organisation's electronic data and information technology systems from information security threats while securing and protecting the confidentiality of their stakeholders' information.
Source: (Snyder, 2017)