from The Open University
Alternatively you can skip the navigation by pressing 'Enter'.
The Hunt: Episode 4: Hunger at SeaSunday, 29th November 2015 16:50 - BBC OneHow do predators find prey in the open ocean - a vast watery desert where food is scarce and widespread? Blue whales,... Read more: The Hunt: Episode 4: Hunger at Sea
Ireland with Simon Reeve: Episode 2Sunday, 29th November 2015 20:00 - BBC Two
Power to the People: Episode 3: The Customer is Always RightTuesday, 1st December 2015 21:00 - BBC Four
Power to the People: Episode 3: The Customer is Always RightWednesday, 2nd December 2015 02:25 - BBC Four
The Hunt: Episode 4: Hunger at SeaAvailable until Tuesday, 29th December 2015 17:50How do predators find prey in the open ocean - a vast watery desert where food is scarce and widespread? Blue whales,... Read more: The Hunt: Episode 4: Hunger at Sea
Catching History's Criminals: The Forensics Story: Traces Of GuiltAvailable until Tuesday, 29th December 2015 00:00
BBC Inside Science: Astronomy Q&A, CERN and ancient genomesAvailable for over a year
All in the Mind: Mindfulness, porn addiction and slothfulnessAvailable for over a year
Star Wars VII: Myth and fairy taleWhat storytelling styles and genres can be applied to Star Wars. Sarah Haslam investigates... Read more: Star Wars VII: Myth and fairy tale
The HuntNew ground-breaking OU/BBC natural history series The Hunt, narrated by Sir David... Read more: The Hunt
Introduction to cyber securityThis free course, Introduction to cyber security, will help you to understand online security and... Try: Introduction to cyber security now
English: skills for learningThis course is for anybody who is thinking of studying for a university degree and would like to... Try: English: skills for learning now
An introduction to information security
Headline news scares about stolen or missing data are becoming a frequent occurrence....
Headline news scares about stolen or missing data are becoming a frequent occurrence. This free course, An introduction to information security, discusses the importance of protecting information. Organisations are relying more and more heavily on computers to store sensitive corporate and customer information and this OpenLearn course gives an overview of information security management systems.
By the end of this course you should have developed an understanding of:
- how you select appropriate techniques to tackle and solve problems in the discipline of information security management;
- why security and its management are important for any modern organisation;
- how an information security management system should be planned, documented, implemented and improved, according to the BSi standard on information security management.
- Current section: Introduction
- Learning outcomes
- 1 Why is information security important?
- 2 Information, information security and information security management
- 3 Information security imperatives and incentives
- 4 Information assets
- 5 Planning an information security management system
- 5.1 Introduction
- 5.2 The Standard's approach to planning an ISMS
- 5.3 Setting up an ISMS
- 5.4 ISMS documentation
- 6 Risk assessment and asset identification
- 7 The PDCA cycle
- 8 Summary
Study this free course
Enrol to access the full course, get recognition for the skills you learn and track your progress. Make your learning visible!
An introduction to information security
Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This free course, An introduction to information security, begins by explaining why information security and its management are important for any modern organisation. The course continues by examining the value that can be placed on information as an organisational asset. The protection of information assets is the subject of the BSi standard on information security management, and the course goes on to explain how an information security management system should be planned, documented, implemented and improved, according to the standard. This course is based on readings from the book IT Governance: A Manager's Guide to Data Security & BS 7799/ISO 177799 (2nd edition) by Alan Calder and Steve Watkins (Kogan Page, 2003). (Note: This book is now in 3rd edition). In order to study this free course you will need to buy this book. You will also need to pay if you want access to the British Standard (mentioned above) using British Standards Online.
Enrol to get a record of achievement
By enrolling on this course and setting up a free Open University account you can track your progress in My OpenLearn. When you’ve finished you can print off the free activity record to demonstrate your learning.
This free course is an adapted extract from the Open University course M886 Information security management, which is no longer taught by the University. The replacement course is.
This is an extract from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing and ICT courses or view the range of currently available OU Computing and ICT courses.
Copyright & revisions
Originally published: Wednesday, 18th May 2011
Last updated on: Monday, 13th July 2015
- Creative-Commons: The Open University is proud to release this free course under a Creative Commons licence. However, any third-party materials featured within it are used with permission and are not ours to give away. These materials are not subject to the Creative Commons licence. See terms and conditions. Full details can be found in the Acknowledgements section.
- This site has Copy Reuse Tracking enabled - see our FAQs for more information.
If you enjoyed this, why not follow a feed to find out when we have new things like it? Choose an RSS feed from the list below. (Don't know what to do with RSS feeds?)
Remember, you can also make your own, personal feed by combining tags from around OpenLearn.