logo

Policy Management | Overview of Models

Review and provide an overview of governance models such as COBIT, ISO 27002, ITIL, and OCTAVE, and discuss reasons for choosing one model over another.

6 Pages1182 Words24 Views
   

Added on  2022-09-02

Policy Management | Overview of Models

Review and provide an overview of governance models such as COBIT, ISO 27002, ITIL, and OCTAVE, and discuss reasons for choosing one model over another.

   Added on 2022-09-02

ShareRelated Documents
Running head: POLICY MANAGEMENT
POLICY MANAGEMENT
Enter the name of the Student:
Enter the name of the University:
Author note:
Policy Management | Overview of Models_1
POLICY MANAGEMENT1
Table of Contents
1. Overview of the models.........................................................................................................2
1.1. COBIT (Control Objective over Information and related Technology).........................2
1.2. ISO 27002.......................................................................................................................2
1.3. ITIL (Information Technology Infrastructure Library)...................................................2
1.4. OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)...........3
2. Reasons of choosing the governance models by any organization........................................3
3. References..............................................................................................................................5
Policy Management | Overview of Models_2
POLICY MANAGEMENT2
1. Overview of the models
1.1. COBIT (Control Objective over Information and related Technology)
The COBIT is the framework that is high level and is published by the ITGI. It can
map the core processes of the IT such a way that permits the authority bodies mainly the
business executives to perform the important policies also the techniques successfully
(Huygh, De Haes, Joshi & Van Grembergen, 2018). Sometime this is used for linking
together the controls, risks and the technical issues within any organization.
1.2. ISO 27002
It supplies the top exercise references for the ISMS that is Information Security
Management System standard executed sometime by consuming this ISO 27001 (Pereira,
Ferreira & Amaral, 2017). Both are developed by ISO that is International Organization for
Standard. Whenever 27001 conveys the system of management which for controlling the
security of the information, this does not deliver particular or business connected controls
which is left up to the ISO 27002. It is mainly used by the IT department exact to any
organization (Tari Schreider, CISM & CISO, 2017). Department of IT is the main center of
this resulting controls of the management system.
1.3. ITIL (Information Technology Infrastructure Library)
It is the set of the greatest practices any association may execute with the intention of
the support assets of IT also presents to the aims of business. It is presented in the sequence
of five main publications. Each one are equivalent to the phase in the IT lifespan (Fenz,
Plieschnegger & Hobel, 2016). This procedures develops documents of this procedures, tasks
also the worksheets that are not exact to this business with the aim of being capable to
generate the standard from which execute the controls also determine the success. Originally
it was designed for the use inside the government of U.K. also it is the most related inside this
Policy Management | Overview of Models_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Governance Models | Report
|8
|1359
|20

Professional Practice in IT Assignment
|6
|1013
|26

Importance of Cyber Security Risk Management in E-commerce Companies
|4
|729
|432

Risk Assessment on Network Infrastructure of CONVXYZ
|27
|3351
|91

Cybersecurity. task. Student name. Solution: one. Cyber
|3
|326
|72

ABC Logistics: Case Study
|7
|1548
|37