{"id":10838,"date":"2022-08-02T18:08:34","date_gmt":"2022-08-02T18:08:34","guid":{"rendered":"https:\/\/zhorse.net\/?page_id=10838"},"modified":"2023-05-21T21:27:54","modified_gmt":"2023-05-21T21:27:54","slug":"information-security-management","status":"publish","type":"page","link":"https:\/\/zhorse.net\/applications\/information-security-management\/","title":{"rendered":"Information Security Management"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\tApplications<\/span>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Information Security Management <\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Information Security Management <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

What is Information Security Management?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Information security management is the process of ensuring an organization\u2019s information assets are accounted for, classified, and maintained. It is an important element of information security. It helps us understand how sensitive data is, who should access it and what level of protection we need to give it.<\/p>

The CIA triad (Confidentiality, Integrity, and Availability) is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure. The initials stand for these principles:<\/p>