Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q5974820> ?p ?o }
Showing triples 1 to 46 of
46
with 100 triples per page.
- Q5974820 subject Q19363357.
- Q5974820 subject Q7216528.
- Q5974820 abstract "The ITIL security management process describes the structured fitting of security in the management organization. ITIL security management is based on the ISO 27001 standard. According to ISO.ORG "ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties."A basic concept of security management is the information security. The primary goal of information security is to guarantee safety of information. When protecting information it is the value of the information that must be protected. These values are stipulated by the confidentiality, integrity and availability. Inferred aspects are privacy, anonymity and verifiability.The goal of the Security Management is split up in two parts: The realization of the security requirements defined in the service level agreement (SLA) and other external requirements which are specified in underpinning contracts, legislation and possible internal or external imposed policies. The realization of a basic level of security. This is necessary to guarantee the continuity of the management organization. This is also necessary in order to reach a simplified service-level management for the information security, as it happens to be easier to manage a limited number of SLAs than it is to manage a large number of SLAs.The input of the security management process is formed by the SLAs with the specified security requirements, legislation documents (if applicable) and other (external) underpinning contracts. These requirements can also act as key performance indicators (KPIs) which can be used for the process management and for the justification of the results of the security management process.The output gives justification information to the realization of the SLAs and a report with deviations from the requirements.The security management process has relations with almost all other ITIL-processes. However, in this particular section the most obvious relations will be the relations to the service level management process, the incident management process and the Change Management process.".
- Q5974820 thumbnail Control_Process_model.jpg?width=300.
- Q5974820 wikiPageExternalLink informationsecurity.html.
- Q5974820 wikiPageExternalLink itil.technorealism.org.
- Q5974820 wikiPageExternalLink 95672.
- Q5974820 wikiPageExternalLink www.ism3.com.
- Q5974820 wikiPageExternalLink catalogue_detail?csnumber=42103.
- Q5974820 wikiPageExternalLink security.htm.
- Q5974820 wikiPageExternalLink www.itil.co.uk.
- Q5974820 wikiPageExternalLink www.itil.org.uk.
- Q5974820 wikiPageExternalLink www.itilcommunity.com.
- Q5974820 wikiPageExternalLink www.itsmf.com.
- Q5974820 wikiPageExternalLink default.mspx.
- Q5974820 wikiPageExternalLink mofsmsmf.mspx.
- Q5974820 wikiPageExternalLink www.opensecurityarchitecture.org.
- Q5974820 wikiPageWikiLink Q10566551.
- Q5974820 wikiPageWikiLink Q1061970.
- Q5974820 wikiPageWikiLink Q11028.
- Q5974820 wikiPageWikiLink Q116348.
- Q5974820 wikiPageWikiLink Q11779543.
- Q5974820 wikiPageWikiLink Q1329012.
- Q5974820 wikiPageWikiLink Q13479512.
- Q5974820 wikiPageWikiLink Q152361.
- Q5974820 wikiPageWikiLink Q1662500.
- Q5974820 wikiPageWikiLink Q1795585.
- Q5974820 wikiPageWikiLink Q189900.
- Q5974820 wikiPageWikiLink Q1925081.
- Q5974820 wikiPageWikiLink Q19363357.
- Q5974820 wikiPageWikiLink Q2526135.
- Q5974820 wikiPageWikiLink Q255104.
- Q5974820 wikiPageWikiLink Q311472.
- Q5974820 wikiPageWikiLink Q384871.
- Q5974820 wikiPageWikiLink Q4284656.
- Q5974820 wikiPageWikiLink Q443955.
- Q5974820 wikiPageWikiLink Q544025.
- Q5974820 wikiPageWikiLink Q7216528.
- Q5974820 wikiPageWikiLink Q7247227.
- Q5974820 wikiPageWikiLink Q820214.
- Q5974820 wikiPageWikiLink Q860554.
- Q5974820 wikiPageWikiLink Q869830.
- Q5974820 wikiPageWikiLink Q929673.
- Q5974820 comment "The ITIL security management process describes the structured fitting of security in the management organization. ITIL security management is based on the ISO 27001 standard. According to ISO.ORG "ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations).".
- Q5974820 label "ITIL security management".
- Q5974820 depiction Control_Process_model.jpg.