from The Open University
Alternatively you can skip the navigation by pressing 'Enter'.
Thinking Allowed: The Ethnography Award 'Shortlist' 2015Monday, 20th April 2015 00:15 - BBC Radio 4This week's Thinking Allowed hosts a special programme dedicated to academic research in ethnography. Read more: Thinking Allowed: The Ethnography Award 'Shortlist' 2015
A History of Ideas - Descartes Cogito Ergo SumAvailable until Thursday, 14th April 2016 08:30Stephen Fry explains Rene Descartes argument 'Cogito Ergo Sum' - 'I think, therefore I am'. Watch now: OU on the BBC: A History of Ideas - Descartes Cogito Ergo Sum
A History of Ideas - Erving Goffman's Performed SelfAvailable until Thursday, 14th April 2016 08:15
Thinking Allowed: The Ethnography Award 'Shortlist' 2015Available until Friday, 15th April 2016 09:45
A History of Ideas - John Locke and personal memoryAvailable until Thursday, 14th April 2016 11:15
What does it mean to be me?Watch these short and snappy animations on the subject of me: the individual, memory, 'self' and... Watch now: What does it mean to be me?
Take the photographic memory testCan you capture scenes just by looking at them? Find out with our photographic memory test. Launch now: Take the photographic memory test
Introduction to bookkeeping and accountingThis free course Introduction to bookkeeping and accounting provides an introduction to the... Try: Introduction to bookkeeping and accounting now
Succeed with maths – Part 1[BETA] If you feel that maths is a mystery that you want to unravel then this short 8-week course... Try: Succeed with maths – Part 1 now
An introduction to information security
Headline news scares about stolen or missing data are becoming a frequent occurrence as...
Headline news scares about stolen or missing data are becoming a frequent occurrence as organisations rely more and more heavily on computers to store sensitive corporate and customer information. This unit discusses the importance of protecting information and gives an overview of information security management systems.
By the end of this unit you should have developed an understanding of:
- how you select appropriate techniques to tackle and solve problems in the discipline of information security management;
- why security and its management are important for any modern organisation;
- how an information security management system should be planned, documented, implemented and improved, according to the BSi standard on information security management.
- Current section: Introduction
- Learning outcomes
- 1 Why is information security important?
- 2 Information, information security and information security management
- 3 Information security imperatives and incentives
- 4 Information assets
- 5 Planning an information security management system
- 5.1 Introduction
- 5.2 The Standard's approach to planning an ISMS
- 5.3 Setting up an ISMS
- 5.4 ISMS documentation
- 6 Risk assessment and asset identification
- 7 The PDCA cycle
- 8 Summary
An introduction to information security
Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This unit begins by explaining why information security and its management are important for any modern organisation. The unit continues by examining the value that can be placed on information as an organisational asset. The protection of information assets is the subject of the BSi standard on information security management, and the unit goes on to explain how an information security management system should be planned, documented, implemented and improved, according to the standard. This unit is based on readings from the book IT Governance: A Manager's Guide to Data Security & BS 7799/ISO 177799 (2nd edition) by Alan Calder and Steve Watkins (Kogan Page, 2003). In order to study this unit you will need to buy this set book. You will also need to pay if you want access to the British Standard (mentioned above) using British Standards Online.
This study unit is an adapted extract from the Open University course M886 Information security management, which is no longer taught by the University. If you want to study formally with us, you may wish to explore other courses we offer in this.
This is an extract from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing and ICT course units or view the range of currently available OU Computing and ICT courses.