This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.Information Security Management Proposal
It is intended to develop more than one direction of study for this research in order to be able of responding to at least several aspects of the broad topic. It is believed the results can offer improvements in the field of ISMS with respect to the management of incident response, application of forensic computer techniques& tools, but also risk assessment methodologies.
In most of the situations the management of incident response is dealt by a dedicated team formed within the organization....