Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-9q27g Total loading time: 0 Render date: 2024-07-18T11:36:42.004Z Has data issue: false hasContentIssue false

5 - Security information management model

Published online by Cambridge University Press:  11 November 2021

Get access

Summary

OBJECTIVES

• Discuss the problems that gave rise to a security information management model.

• Reconstruct the model for the collection and analysis of security information and the mitigation of security risks.

• Apply the model for the management of security information, describing each stage.

• Formulate a policy framework for the management of security information.

INTRODUCTION

Security information collection first emerged in the mid-1950s. From then onwards the extent, complexity and detail of security information collection, analysis, interpretation and utilisation changed dramatically and developed in many different ways. These changes and developments in the field of security management, gave rise to the design and development of a security information management model (SIMM). All stakeholders in an organisation need to be informed of these changes and developments, in order to ensure that they are aware of the importance and impact of security information in their overall work environment. Contextually, security management will derive the most significant benefits from the SIMM, which should be integrated into the organisations’ existing functional processes. Security information management should be seen as part of the existing functional processes of an organisation. Incidents, threats and vulnerabilities have the potential to affect an organisation's assets negatively. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be managed effectively and efficiently, so that correct decisions can be made on the implementation of security risk control measures. A SIMM is important for the management of security information. This chapter will discuss the design and development of the SIMM.

DEVELOPMENT OF A SECURITY INFORMATION MANAGEMENT MODEL

No specific SIMM currently exists for the collection and analysis of security information on security incidents, threats and vulnerabilities, and for the implementation of appropriate security risk control measures to reduce crime, increase detection rates and prevent losses in organisations.

Justification for the Model

Collection of security information

According to the respondents, no policy framework exists for the collection of security information. In general, security information is not collected according to the threats and vulnerabilities confronting an organisation. Most of the information is randomly collected by security managers, investigators and supervisors. This type of collection is done mainly by using technical and human methods.

Type
Chapter
Information
Managing Security Information
Incidents, Threats & Vulnerabilities
, pp. 61 - 87
Publisher: University of South Africa
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×