Unit 48 IT Security Management
· Aim
The aim of this unit is to provide an understanding of IT security management to enable learners to manage organisational security.
· Unit abstract
This unit deals with the management of an organisation’s security. This involves controlling access, regulating use, implementing contingency plans and devising security policies and procedures. Breaches in security may be caused by human actions, accidental, malicious or negligent, or through incorrect installation, configuration or operation.
Physical security management involves regulating the access to the computers, network devices, databases etc by physical means such as securing buildings from unauthorised access, prevention of loss or damage due to weather, fire and water ingress. Consideration must also be given to alternative sources of supply of hardware, software, power, telecommunications and suitable buildings to allow the organisation to continue after a disaster has occurred (disaster recovery planning).
Human resource management is also an important topic as regards the management of security. It allows for the selection of roles and responsibilities and the associated documentation of organisational procedures based on current legislation and standards.
· Learning outcomes
On successful completion of this unit a learner will:
- Understand risks to IT security
- Understand mechanisms to control organisational IT security
- Be able to manage organisational security.
Unit content
1 Understand risks to IT security
Risks: types eg unauthorised use of a system without damage to data, unauthorised removal or copying of data or code from a system, damage to or destruction of physical system assets and environment, damage to or destruction of data or code inside or outside the system, naturally occurring risks
Organisational security: procedures eg data, network, systems, operational impact of security breaches, web systems, wireless systems
2 Understand mechanisms to control organisational IT security
Risk assessment: potential loss eg data, intellectual property, hardware and software; probability of occurrence eg disaster, theft; staff responsibilities
Data protection: government regulations eg Data Protection Act 1998, Computer Misuse Act
; company regulations: eg site or system access criteria for personnel; anti-virus software; firewalls, basic encryption techniques; operational continuity planning; back-up procedures
Physical security: types eg biometrics, swipe cards, theft prevention
3 Be able to manage organisational security
Organisational security: policies eg system access, access to internet email, access to internet browser, development/use of software, physical access and protection, 3rd party access, business continuity, responsibility; controlling security risk assessments and compliance with security procedures and standards eg ISO/IEC 17799:2005 Information Technology (Security Techniques – code of practice for information security management); informing colleagues of their security responsibilities and confirming their understanding at suitable intervals
Security: tools eg user logon profiles to limit user access to resources, online software to train and update staff, auditing tools to monitor resource access
Security audits: gathering and recording information on security; initiating suitable actions to deal with identified breaches of security (see also Human resource issues below); scheduling of security audits; defining requirements for security audits
Human resource issues: staff rights and responsibilities; coping with disaffected staff eg disciplinary procedures in the event of identified security breaches
Learning outcomes and assessment criteria
Learning outcomes On successful completion of this unit a learner will: | Assessment criteria for pass The learner can: |
LO1 Understand risks to IT security | identify and evaluate types of security risks to organisationsvaluate organisational security procedures |
LO2 Understand mechanisms to control organisational IT security | discuss risk assessment proceduresevaluate data protection processes and regulations as applicable to an organisationanalyse physical security issues for an organisation |
LO3 Be able to manage organisational security | design and implement a security policy for an organisationevaluate the suitability of the tools used in an organisational policydiscuss the human resource issues that have to be considered when carrying out security audits. |
Guidance
Links to National Occupational Standards, other BTEC units, other BTEC qualifications and other relevant units and qualifications
The learning outcomes associated with this unit are closely linked with:
Level 3 | Level 4 | Level 5 |
Unit 7: Organisational Systems Security | Unit 36: Internet Server Management | |
Unit 46: Network Security | ||
Unit 47: IT Virtualisation |
This unit has links to the Level 4 and Level 5 National Occupational Standards for IT and Telecoms Professionals, particularly the areas of competence of:
- Information Management
- IT Security Management
- Disaster Recovery.