Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-swr86 Total loading time: 0 Render date: 2024-07-18T13:25:16.601Z Has data issue: false hasContentIssue false

7 - Summary

Published online by Cambridge University Press:  11 November 2021

Get access

Summary

OBJECTIVES

• Understand the management of incidents, which is the consequence of vulnerabilities and threats.

• Distinguish between the concepts incidents, threats and vulnerabilities.

• Be aware of the different types of incidents and how to handle them.

• Describe the steps a security practitioner must follow when attending to security incidents.

INTRODUCTION

This book was written to enlighten security officials about security information management, which includes the collection and analysis of information on security incidents, threats and vulnerabilities and the implementation of security risk control measures. The security industry operates within a diverse and multi-disciplinary knowledge base, with security risk management being a fundamental knowledge domain within security. Over the past decade, the concept of security risk management as a formal discipline has emerged throughout the private and government sectors of security. Security risk management is now a well-established discipline, with its own body of knowledge. The standards and compliance requirements for risk management only considers security risk management and not security information management. In security risk management, security risk assessment is carried out to identify areas that need security intervention. The security risk management framework currently used by the security industry provides for security risk analysis. This does not include the day-to-day collection of security information on security incidents, threats and vulnerabilities for the purpose of reducing crime, increasing detection rates and preventing losses. In this final chapter, attention will be given to a brief summary of the kinds of security information that was discussed in this book.

SECURITY INCIDENTS, THREATS AND VULNERABILITIES

Security incidents occur because of security breaches, breaches of discipline by security officers, and poor implementation of existing security policies and procedures. Threat is considered as the consequence of the incident, which at the time the incident was taking place, may have affected people, information or assets. In the security context, a threat may be defined as an adversary, being the sum of intent and capability (Smith and Brooks, 2013). Vulnerability on the other hand gives exposure for an incident to occur, causing physical and emotional hurt, being open to attack, or lacking resilience (Smith and Brooks, 2013). It was found that in many organisations/companies security incidents are managed without any strategic direction and infrastructure.

Type
Chapter
Information
Managing Security Information
Incidents, Threats & Vulnerabilities
, pp. 115 - 118
Publisher: University of South Africa
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Summary
  • Doraval Govender
  • Book: Managing Security Information
  • Online publication: 11 November 2021
  • Chapter DOI: https://doi.org/10.25159/000-7.010
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Summary
  • Doraval Govender
  • Book: Managing Security Information
  • Online publication: 11 November 2021
  • Chapter DOI: https://doi.org/10.25159/000-7.010
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Summary
  • Doraval Govender
  • Book: Managing Security Information
  • Online publication: 11 November 2021
  • Chapter DOI: https://doi.org/10.25159/000-7.010
Available formats
×