Filling the gap of Information Security Management inside ITIL: proposals for posgraduate students
نویسندگان
چکیده
This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, and describe the different at distance post-graduated courses we offer that fill these methodologies and discuss the opinions and evaluations of our students. Keyword: Information security management, ITIL, ISO 27001, Professional education.
منابع مشابه
ITIL-based IT service management maturity model design in health-based organizations (Case Study: City of Tehran)
Today, Information Technology services are considered as valuable resources in all areas. For making Information Technology Management Processes purposeful and efficient in different organizations &ndash as a competitive and strategic advantage (especially in organizations responsible for health care services) &ndash it is necessary to recognize the level of maturity of the organization and rev...
متن کاملA new framework for bridging the gap between IT Service Management and IT Governance from a security perspective
With COBIT and ITIL at the forefront of IT governance and IT service management, respectively, there is a need to establish if ITIL Security Management complies with COBIT DS5. This paper investigates the possible compliance and any related issues by comparing the requirements of COBIT DS5 against the measures of ITIL Security Management. Results indicate that ITIL Security Management is unable...
متن کاملA process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کامل