logo

ITIL for Information Security PDF

   

Added on  2021-12-14

21 Pages5597 Words56 Views
Running head: ITIL FOR INFORMATION SECURITY
ITIL for Information Security
Name of the Student
Name of the University
Author Note

ITIL FOR INFORMATION SECURITY
1
Table of Contents
Introduction:..........................................................................................................................................................................................................3
Key issues for utilizing ITIL for Information Security Management:..................................................................................................................3
Policy related issue:.........................................................................................................................................................................................4
Acceptance of the Businesses:........................................................................................................................................................................4
Assessment and Classification related Issues:................................................................................................................................................5
Technical issues:.............................................................................................................................................................................................5
Commitment of the Management:...................................................................................................................................................................5
Resistance of the ITIL:....................................................................................................................................................................................6
Framework of Utilizing ITIL for Information Security Management:.................................................................................................................6
Control:............................................................................................................................................................................................................7
Plan:.................................................................................................................................................................................................................7
Implement:......................................................................................................................................................................................................7
Evaluate:..........................................................................................................................................................................................................8
Maintain:.........................................................................................................................................................................................................8
Primary Content:...................................................................................................................................................................................................9
Process of application of ITIL in organisation:.............................................................................................................................................10
Roadmap of ITIL:..........................................................................................................................................................................................11
Critical Success Factors:.....................................................................................................................................................................................12
Support of the Management:.........................................................................................................................................................................12
Training and awareness about ITIL:.............................................................................................................................................................13
Interdepartmental Collaboration:..................................................................................................................................................................13
Selection of Tools:........................................................................................................................................................................................13
Customer Orientation:...................................................................................................................................................................................13
Design and Implementation Strategy:...........................................................................................................................................................13
Quality of the allocated IT staffs for the ITIL:..............................................................................................................................................14
Evaluation and Monitoring of the ITIL Management:..................................................................................................................................14
Conclusion:..........................................................................................................................................................................................................14
References:..........................................................................................................................................................................................................16

ITIL FOR INFORMATION SECURITY
2

ITIL FOR INFORMATION SECURITY
3
Introduction:
The ITIL is considered as the set practices related with the IT services management.
The main focus of the ITIL is aligning the services of IT with business needs. In the present
form the ITIL is published in the market consisting a series which is having five numbers of
core volumes (Esteves & Alves, 2013). Each of this core volumes different lifecycle stage of
the ITSM. This ITIL describes the procedures, process, checklists and the tasks which not
specific with the technology nor specific with the organizations. Though it is not specific
with them but still it can be used by various organizations for integration establishment with
the strategy of the organization, minimum level of competency maintaining and with
delivering value. This system allows the organization to create a baseline from which
planning, implementation and the measurement can be done.
In this article utilization of the ITIL will be considered and by that its utilization in the
information security management will be discussed in this case. To perform this discussion
efficiently, key issues with utilizing the ITIL for the information security management will be
discussed in this case. Following this discussion of the model or the framework of the
information security management using the ITIL will be evaluated in this article. After that,
primary content of the selected article will be evaluated properly. Further, the critical success
factors of the ITIL utilization in the information security management will be evaluated.
Finally, a conclusion will be given to summarize the whole discussion of this article.
Key issues for utilizing ITIL for Information Security Management:
In the implementation of the Information Technology Infrastructure Library or the
ITIL for the Information Security Management there are various issues which can arise.
Some of this issues are very much important to mitigate and thus this issues are considered as

ITIL FOR INFORMATION SECURITY
4
the key issues which this utilization technique is facing. In the below section the main key
issues will be discussed and how this issues can be solved will be evaluated.
Policy related issue:
This policy related issue is one of the common key issue related with the information
security management. These policies are some kind of guidelines or instructions which are set
by the organizations to ensure that all the users of the information technology can use this
technology without any type of security concern (Laudon & Laudon, 2016). This security
concern is the security of the vital information of the organization which is stored within the
organization digitally. The motto of every organization is to protect and control the
confidential data of its. This means these type of data may be encrypted or authorised by
some third party system which helps to protect the system. Thus, while utilizing the ITIL in
the information security management the policy related issue of the organization can occur as
new system is implemented which might can access those confidential data (Arasu et al.,
2015). To mitigate this key issue the organization may need to revise the security policy or
may be need to create completely new policy of the information security.
Acceptance of the Businesses:
Acceptance of the ITIL services in the businesses is a key issue. Many organizations
or the businesses does not accept the implementation of the ITIL in their businesses which is
also same for the implementation of the Information Technology Infrastructure Library in the
information security management (Salcito, Wielga & Singer, 2015). This is not accepted by
many organizations because of the reason that it is not transparent to the organizations or the
businesses. The Information Technology Infrastructure Library is able to change the working
way of the organization that it can make changes in the requests which as been made by the
organization and can open the support tickets. Also, it is not accepted because many of the
organization failed to determine what benefit is provided by the ITIL in the business. Thus

ITIL FOR INFORMATION SECURITY
5
the ITIL needs to show a strong support in the businesses from the very beginning. Otherwise
this will be considered as a useless thing in the organisation.
Assessment and Classification related Issues:
For the implementation of the Information Technology Infrastructure Library in the
information security management another key issue is the assessment and the classification of
the information assets. The classification of the informational assets is very much important
in the sense that it allow to identify every aspects of the information by using a standardized
system. Thus it is required to brief assessment and the classification of all the documentations
and information assets.
Technical issues:
The technical implementation related issue of the ITIL in the information security
management is a big issue. The organization need to focus on that for a successful
implementation of the ITIL (Pillai, Pundir & Ganapathy, 2014). The main reason behind the
occurrence of this issue is that the ITIL is not a technology itself. The ITIL itself is dependent
on some other technology for its execution. This technological implementations are very
much challenging in the organizations as it might be very much costly to implement or either
it maybe not supported with the current framework of the organization. Thus this dependency
is making the implementation of the ITIL in information security management very much
challenging.
Commitment of the Management:
The commitment of the management is a big success factor for utilizing the ITIL in
the information security management. Also, when the commitment of the management is not
fulfilled then this success factor becomes a key issue for utilizing the ITIL in the information
security management (Bucero & Englund, 2015). The main reason behind the occurrence of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analysis of the Service Management
|22
|4375
|31

Content Analysis of Service Management
|20
|4410
|139

Implementing Information Technology Infrastructure Library (ITIL) | Report
|5
|849
|25

ITIL Incident Lifecycle and its Importance in Managing Workplace
|4
|948
|470

Analysis of ITSM and ITIL Constraints
|21
|4578
|233

IT Service Management
|14
|2623
|454