0% found this document useful (0 votes)
13 views

module1case

Uploaded by

floydmullings
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

module1case

Uploaded by

floydmullings
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

The Framework and 1

Running Head: The Framework and Principles of Information Security Management

TUI UNIVERSITY

Module 1 – Case Assignment

Course #: ITM517

Information Security Overview for Managers and Policy Makers


The Framework and 2

Introduction

Information is a valuable asset in any organization, whether it is printed or written on

paper, stored electronically or sent by mail or electronic means (British Standards Institution,

2009). Industry and consumers alike recognize the need for information security – consumers

from the viewpoint of keeping their information private and businesses from the perspective of

its importance to long-term growth of the IT sector (Wright et al., 2008). To effectively manage

the threats and risks to an organization's information, the organization should establish a

framework of information security management. This paper discusses the importance of a

framework of information security management, then states how a framework differs from

information security and concludes with an overview of some information security principles.

The Framework of Information Security Management: Today’s economy highly

depends on the secure flow of information within and across organizations; therefore,

information security is of paramount importance. A secure and trusted environment for stored

and shared information greatly enhances consumer benefits, business performance and

productivity, and national security (Conner et al., n.d). In an effort to achieve such goals the

Business Software Alliance (BSA) task force identified four findings: 1) government has already

established a significant legislative and regulatory regime around IT security, and is considering

additional action; 2) information security is often treated solely as a technology issue, when it

should also be treated as a governance issue; 3) there is already broad consensus on the actions

necessary to remedy the problem; and 4) lack of progress is due in part to the absence of a

governance framework (Conner et al., n.d).

Congress and state governments have already passed into law several bills that govern

how companies must address information security issues. Some of these include Sarbanes-Oxley
The Framework and 3

Act of 2002, Gramm-Leach-Bliley Act of 1999, Health Insurance Privacy and Accountability

Act and many more.

In looking at the growing abundance of rules, regulations, and guidelines, it quickly


becomes clear that information security is not solely a technical issue, but a corporate
governance challenge. Information security responsibility is too often delegated to the
chief information officer or the chief security officer, who suffer conflicting demands
with regard to IT functionality and costs and who may not be in a position to leverage the
resources and authority necessary to address the problem across multiple business lines or
divisions. To make real progress, firms must address information security, not solely as a
technology issue, but as a matter of “corporate best practices” (covering people,
processes, and technology) and frame solutions in terms that are broadly relevant to
business operations (Conner et al., n.d).

There is already broad consensus on the actions necessary to remedy the problem.

A review of literature shows that most guidance documents and other reports recommend a

common solution and support the approach reflected in ISO 17799 and the Federal Information

Security Management Act (FISMA) (Conner et al., n.d).

With all these measures in place, why are organizations still not successful in obtaining

effective information security? The conclusion of the BSA task force is that a vital piece of the

puzzle is still missing -- an information security governance framework that private industry can

readily adopt (Conner et al., n.d). What is needed is a framework that specifies what corporate

executives, business unit heads, senior managers, and CIOs/CISOs should do; that identifies

business drivers, clarifies roles and responsibilities, recognizes commonalities and defines

metrics; and that is flexible enough to apply to different business models (Conner et al., n.d). An

example is outlined on page 6. The horizontal axis identifies different management levels while

the vertical axis identifies the business drivers, responsibilities, and metrics.

The framework poses three sets of questions, with regard to information security: The

first set of questions identifies the drivers behind security objectives – drivers that will be

different for different businesses and industries. For example, is the driver a market condition
The Framework and 4

such that a company will experience significant brand erosion in the event of a cyber attack? The

second question refers to the programs and processes to be put in place to accomplish

organizational security objectives. These programs are common to almost all organizations. The

last set of questions focuses on assessing risk, measuring the effectiveness of security controls,

and making improvements as necessary (Conner et al., n.d).

Framework of Information Security Management vs. Information Security: The

framework of information security management (FISM) is different from information security.

Information security is protecting information from unauthorized access, use, disclosure,

disruption, modification and destruction; while FISM is that and much more. Information

security alone is not good enough. As the BSA task force discovered, several measures were

already in place yet proper security was not achieved, what was missing was governance FISM.

The Data Mining Corporation (DMC) discussed in the article “The Illusion of Security”

is a perfect example of a corporation that has tight information security. The security is so tight

that even the employees are given location implants. The company collects data about

individuals from hundreds of sources and then sells the aggregated data back to many of those

sources (Wright et al., 2008). Despite the high level of security at DMC, three of its employees

were still able to steal and run off with some very important information which eventually

publicly disgraced the highly trusted secured corporation. DMC can hardly believe that its many

security measures—video surveillance, biometrics, key-logging software, access control

measures, regular audits, employee implants and so on—could fail (Wright et al., 2008). DMC

had very good information security measures in place, but did it have an effective FISM? It is

obvious that DMC security was highly dependent on technology. FISM however, does not treat

security as solely a technical issue, but also as a governance issue. In this manner the information
The Framework and 5

security duties of all upper level managers are clearly outlined. For example, even in the

profiling of employees the HR manager at DMC would apply the principles of the FISM to

ensure that the staff employed can be trusted.

Principle of Managing Information Security: Along with a framework of information

security, management organizations also need to practice good information security management

principles in order to optimize information security. For optimum security, organizations should

consider the following principles: security polices should be created, communicated,

implemented, endorsed, monitored, and enforced across the organization; every member of an

organization should be made aware of the importance of information security and be trained in

good security practices; there should be proper access controls to make certain only identified

and authorized users with a legitimate need can access information and system resources;

security should be consider throughout the system life cycle; monitoring, auditing, and reviewing

system activities should be a routine and regular function and business continuity plans must be

tested regularly and updated (Conner et al., n.d).

Conclusion

Despite legislative and technological measures that are already in place to achieve

information security, an organization will not achieve optimum security until an effective FISM

is established. An effective framework specifies what corporate executives, business unit heads,

senior managers, and CIOs/CISOs should do; that identifies business drivers, clarifies roles and

responsibilities, recognizes commonalities and defines metrics; and that is flexible enough to

apply to different business models (Conner et al., n.d). Implementing the best security

technology does not guarantee security as was demonstrated in the case of DMC. An effective

framework that practices good information security principles is much more effective.
The Framework and 6

Toward a Framework for Action on Information Security Governance

Actors\Actions Corporate Business Unit Head Senior Manager CIO/CISO


Executives
Governance/Business What am I required to do? / What am I afraid not to do?
Drivers
These tend to be sector Legislation, ROI Standards, policies, Standards, audit Security policies,
or budgets results security
organization-specific.) operations, and
resources
Roles and How do I accomplish my objectives?
Responsibilities
(These tend to be • Oversight and • Provide • Provide security
• Develop, maintain,
generic coordination of information for and
across industries and policies security protection information and ensure compliance
organizations.) • Oversight of commensurate systems to
business unit with • Periodic program
compliance the risk and assessments of • Designate security
• Compliance business impact. assets and their officer
reporting • Provide security associated risks with primary duties
• Actions to training • Determine level of
and training
enforce • Develop the Security • Develop required
accountability controls appropriate policies to
environment and • Implement policies
support security
activities and program
• Report on procedures to and business unit
effectiveness of cost effectively specific needs
policies, reduce risk to • Develop information
procedures acceptable levelsuse and
and practices • Periodic test of categorization plan
security • Assist senior
and controls managers with
their security
responsibilities
• Conduct security
awareness
Metrics/Audit How effectively do I achieve my objectives? What adjustments do I need to make?
(These tend to be Financial Policy violations, Risk assessment and Security awareness
sector or reporting, misuse of assets, impact analysis, effectiveness, incident
organization-specific.) monetizing losses, internal control control response and impact
conforming to violations environment analysis, security
policies activities, program
remedial actions, effectiveness,
policy and information
procedure integrity, effects on
compliance, information processing
security and control
test
results
The Framework and 7

Reference

British Standards Institution. (2009). Information security management. Retrieved January 14,

2010 from http://www.bsigroup.com/en/Assessment-and-certification-

services/management-systems/Business-areas/Information-Security-Management/

Conner, B., Noonan, T., Holleyman, R. (n.d). Information security governance: toward a

framework for action. Business Software Alliance. Retrieved January 12, 2010 from

http://www.bsa.org/country/Research%20and%20Statistics/~/media/BD05BC8FF0F04C

BD9D76460B4BED0E67.ashx

Wright, D., Friedewald, M., Schreurs, W., Verlinden, M., Gutwirth, S., Punie, Y., Maghiros, I.,

Vildjiounaite, E., Alahuhta, P. (2008). The illusion of security. Communications of the

ACM, Vol. 51 Issue 3, p56-63. Retrieved January, 2010 from TUI library.

http://delivery.acm.org/10.1145/1330000/1325567/p56-wright.pdf?key
1=1325567&key2=6585826321&coll=GUIDE&dl=GUIDE&CFID=24785424&CFTOK
EN=490 09685

Sipior, J., Ward, B. (2008). A framework for information security management based on guiding

standards: A United States perspective. Issues in Informing Science and Information

Technology Volume 5. Retrieved January 13, 2010 from

http://proceedings.informingscience.org/InSITE2008/IISITv5p051-060Sipior491.pdf

You might also like