Information Security Management Framework

Read Complete Research Material



Information Security Management Framework

Information Security Management Framework

Introduction

The purpose of this paper is to understand the purpose and functions of an information security management framework. The paper would begin with the discussion regarding an information security issue which is quite widespread and carries along with it quite a lot of vulnerabilities for an organization, that is, virus. Hence, for the order of managing with this issue, an information security framework developed by the National Institute of Standards and Technology called risk management framework would be studied. The various perspectives in an organization would be looked over that help in the management of this issue.

Information security issue: Virus - Spam and Phishing

In the highly connected world of today, messaging tools like email are crucial business tools. Nevertheless, electronic messaging, behind the convenience, may carry worms, spam, viruses, inapt image files and other destructive content which may acutely compromise the networks and information assets of an organization. Attackers and spammers always use tricks like phishing scams and spam for performing deceitful activities. Spam is actually the referred to the unsolicited, bulk messages transmitted as in a short message, fax or an email irrespective of whether the made a request for not receiving them anymore. Spammers generally transmit these types of messages to a number of recipients in anticipation that some would be interested in their information or products and would respond to their offers/messages.

Phishing attacks entail accumulative distribution of deceitful electronic messages having return links, branding, and addresses that seem to be originated from valid organizations like credit card companies, retailers, insurance agencies, and banks. Phishing scams entail the usage techniques for social engineering attempting to taint one's computer with damaging codes or ask them to impart their sensitive or personal information. Normally, they appear in the form of alerts, urgent updates, or ...
Related Ads