from The Open University
Alternatively you can skip the navigation by pressing 'Enter'.
Thinking Allowed: Factory music and volunteering post-recessionWednesday, 1st July 2015 16:00 - BBC Radio 4<p>On this week's programme, Laurie Taylor and guests discuss pop music in worker's culture and how... Read more: Thinking Allowed: Factory music and volunteering post-recession
The Bank: Love and MoneyAvailable until Sunday, 2nd August 2015 00:50The second episode of The Bank looks at love in relation to money - with everything from engagements, marriage,... Read more: The Bank: Love and Money
Thinking Allowed: White working class boys and French thoughtAvailable for over a year
The Bottom Line: Summer 2015: The Bottom Line - Angel InvestorsAvailable for over a year
The Bottom Line: Summer 2015: The Bottom Line - OutsourcingAvailable for over a year
Great Ormond Street HospitalThis series explores the remarkably difficult tasks facing children and medical professionals at... Read more: Great Ormond Street Hospital
From Underground to Outer-space: Studying the impact of volcanoesSpeakers from The Open University's Science Faculty explore whether we are now equipped to spot... Read more: From Underground to Outer-space: Studying the impact of volcanoes
The role of the managerThis free course, The role of the manager, examines the manager role in theory and in practice.... Try: The role of the manager now
Succeed with maths – Part 1If you feel that maths is a mystery that you want to unravel then this short 8-week course is for... Try: Succeed with maths – Part 1 now
An introduction to information security
Headline news scares about stolen or missing data are becoming a frequent occurrence....
Headline news scares about stolen or missing data are becoming a frequent occurrence. This free course, An introduction to information security, discusses the importance of protecting information. Organisations are relying more and more heavily on computers to store sensitive corporate and customer information and this OpenLearn course gives an overview of information security management systems.
By the end of this course you should have developed an understanding of:
- how you select appropriate techniques to tackle and solve problems in the discipline of information security management;
- why security and its management are important for any modern organisation;
- how an information security management system should be planned, documented, implemented and improved, according to the BSi standard on information security management.
- Current section: Introduction
- Learning outcomes
- 1 Why is information security important?
- 2 Information, information security and information security management
- 3 Information security imperatives and incentives
- 4 Information assets
- 5 Planning an information security management system
- 5.1 Introduction
- 5.2 The Standard's approach to planning an ISMS
- 5.3 Setting up an ISMS
- 5.4 ISMS documentation
- 6 Risk assessment and asset identification
- 7 The PDCA cycle
- 8 Summary
Study this free course
Enrol to access the full course, get recognition for the skills you learn, track your progress and on completion gain a statement of participation to demonstrate your learning to others. Make your learning visible!
An introduction to information security
Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This free course, An introduction to information security, begins by explaining why information security and its management are important for any modern organisation. The course continues by examining the value that can be placed on information as an organisational asset. The protection of information assets is the subject of the BSi standard on information security management, and the course goes on to explain how an information security management system should be planned, documented, implemented and improved, according to the standard. This course is based on readings from the book IT Governance: A Manager's Guide to Data Security & BS 7799/ISO 177799 (2nd edition) by Alan Calder and Steve Watkins (Kogan Page, 2003). In order to study this course you will need to buy this set book. You will also need to pay if you want access to the British Standard (mentioned above) using British Standards Online.
Enrol to get a record of achievement
By enrolling on this course and setting up a free Open University account you can track your progress in My OpenLearn. When you’ve finished you can print off the free activity record to demonstrate your learning.
This free course is an adapted extract from the Open University course M886 Information security management, which is no longer taught by the University. If you want to study formally with us, you may wish to explore other courses we offer in this.
This is an extract from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing and ICT courses or view the range of currently available OU Computing and ICT courses.
Copyright & revisions
Originally published: Wednesday, 18th May 2011
Last updated on: Tuesday, 28th April 2015
- Creative-Commons: The Open University is proud to release this free course under a Creative Commons licence. However, any third-party materials featured within it are used with permission and are not ours to give away. These materials are not subject to the Creative Commons licence. See terms and conditions. Full details can be found in the Acknowledgements section.
- This site has Copy Reuse Tracking enabled - see our FAQs for more information.
If you enjoyed this, why not follow a feed to find out when we have new things like it? Choose an RSS feed from the list below. (Don't know what to do with RSS feeds?)
Remember, you can also make your own, personal feed by combining tags from around OpenLearn.