Information Security
Information Security
It is a prime concern for all those organizations which use computer based information systems as potential of information security breaches is much higher in these as compared to manual ones.
PRINCIPLES OF IS
1. 2. 3. 4. 5. 6. 7. 8. Accountability principle Awareness principle Multidisciplinary principle Integration principle Timeliness principle Reassessment principle Cost-effective principle Societal principle
1.
Accountability principle: following issues should be considered: Specification of ownership of data and information Identification of users who access the system in a unique way Assignment of responsibility for maintenance of data and information Institution of investigative and other remedial procedures when a breach or an attempted breach of information security occurs.
2.
Awareness principle: following issues should be considered: Levels of details disclosed should be consistent with information security requirements Appropriate knowledge should be available to all parties concerned Information security is not one shot action but is an ongoing process so that it becomes part of the organizational culture Security awareness being an on-going process is applicable to all employees, whether old or new recruits
3.
Multidisciplinary principle: issues to ba tackled in this context are as: Business value of the information being protected Technology that is available to meet the information security Impact of organizational and technological changes Requirements of legal and industry norms Requirements of managing advanced technology for information security
4.
Integration principle: the issues that should be addressed are: Information security policy and administration to be included as integral part of the overall management of the organization Information development and information security to be consistent with each other
5.
Timeliness principle: The issues that should be taken care are: Instantaneous and irrevocable nature of business transactions Volume of information generated from the increasingly interconnected and complex information systems Automated tools to support real-time monitoring Expediency of reporting security breaches to appropriate decision making level
6.
Reassessment principle: The issues that should be taken care are: Increase in up gradation of information systems according to business needs Changes in information systems and their infrastructure New threats to emerge over the period of time requiring extra safeguard New information security technology that has emerged or id emerging.
7.
Cost-effective principle: The issues that should be taken care are: Value to and dependence of the organization on a particular information asset The amount of security and confidentiality required The nature of threats that exists Costs and benefits of security Optimum level beyond which costs of security measures to be prohibitive
8.
Societal principle: The issues that should be taken care are: Fair presentation of data and information to legitimate users Ethical use and disclosure of information obtained from others
APPROACHES
Preventive information protection approach Restorative information protection approach Holistic information protection approach
IMPLEMENTATION OF IS
1. 2. 3. 4. 5. 6. DEVELOPMENT OF SECURITY POLICIES PRESCRIBING ROLES AND RESPONSIBILITIES DESIGNING SECURITY MEASURES EDUCATING EMPLOYEES IMPLEMENTATION MONITORING
contd..
2. Security breaches, detection and reporting requirements PRESCRIBING ROLES AND RESPONSIBILITIES Chief information executive: has overall responsibility of developing and operating information systems including security Information security administrator-has overall responsibility for information security Other professionals- responsible for security measures in their respective areas Data owners- responsible for ensuring that appropriate security , consistent with organizational policies , is embedded in the information systems Technology providers-responsible for assisting in implementation of IS Users- responsible for adhering to procedures prescribed for IS
3.
4.
EDUCATING EMPLOYEES
Technical training Behavioral training
5.
IMPLEMENTATION
Managerial control Identification and authentication controls Logical access controls Accountability controls Cryptographic controls
Contd..
Computer operations control Physical and environmental controls
6.
MONITORING
Issues that need to be addressed in achieving effective monitoring include: Appointment of appropriate person, may be information security administrator, with appropriate authority to work and adequate tools and resources to control Establishment of clear investigating procedures Information system audit by external auditors Establishment of audit trail information from a large number of systems that may need to be examined.
SOURCES OF THREATS TO IS
INTERNAL SOURCES EXTERNAL SOURCES
INTERNET FRAUDS
Hacking Protection against hacking: Checking system security Use of firewalls Data encryption Viruses Protection against Viruses Use of antivirus Procurement of software from reliable sources Testing new applications on stand alone systems