Information security
Information security means protecting information and
information systems from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection, recording or
destruction.
Information security is concerned with the confidentiality,
integrity and availability of data regardless of the form the data may take: electronic,
print, or other forms. Computer security can focus on ensuring the availability
and correct operation of a computer
system without concern for the information stored or processed by the computer.
Information assurance focuses on the reasons for assurance that information is
protected, and is thus reasoning about information security.
The CIA triad (confidentiality, integrity and availability)
is one of the core principles of information security. The elements are confidentiality,
integrity,
authenticity,
availability,
and non-repudiation.
Confidentiality
Confidentiality
is the term used to prevent the disclosure of information to unauthorized
individuals or systems. For example, a credit card
transaction on the Internet requires the credit card number to be transmitted from the
buyer to the merchant and from the merchant to a transaction processing network. The system
attempts to enforce confidentiality by encrypting the card number during
transmission, by limiting the places where it might appear (in databases, log
files, backups, printed receipts, and so on), and by restricting access to the
places where it is stored. If an unauthorized party obtains the card number in
any way, a breach of confidentiality has occurred.
Confidentiality is necessary (but
not sufficient) for maintaining the privacy of the
people whose personal information a system holds.
Integrity
In information security, integrity
means that data cannot be modified undetectably. This is not
the same thing as referential integrity in databases,
although it can be viewed as a special case of Consistency as understood in the
classic ACID model
of transaction processing. Integrity is
violated when a message is actively modified in transit. Information security
systems typically provide message integrity in addition to data
confidentiality.
Availability
For any information system to serve
its purpose, the information must be available
when it is needed. This means that the computing systems used to store and
process the information, the security
controls used to protect it, and the communication channels used to access
it must be functioning correctly. High
availability systems aim to remain available at all times, preventing
service disruptions due to power outages, hardware failures, and system
upgrades. Ensuring availability also involves preventing denial-of-service attacks.
Authenticity
In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.Non-repudiation
In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.
Electronic commerce uses technology such as digital
signatures and public key encryption to establish
authenticity and non-repudiation.
Risk management
"Risk management is the process of identifying vulnerabilities and threats to the information resources used by an
organization in achieving business objectives, and deciding what counter measures, if any, to take in
reducing risk to an acceptable level, based on the value of the information
resource to the organization.
There are two things; first, the process of risk
management is an ongoing, iterative process.
It must be repeated indefinitely.
The business
environment is constantly changing and new threats and vulnerability emerge every day. Second,
the choice of countermeasures (controls)
used to manage risks must strike a balance between productivity, cost,
effectiveness of the countermeasure, and the value of the informational asset
being protected.
Risk is the likelihood that something bad will happen
that causes harm to an informational asset (or the loss of the asset). Vulnerability
is a weakness that could be used to endanger or cause harm to an informational
asset. A threat is anything (manmade or act
of nature) that has the potential to cause harm.
The likelihood that a threat will use a vulnerability to
cause harm creates a risk. When a threat does use a vulnerability to inflict
harm, it has an impact. In the context of information security, the impact is a
loss of availability, integrity, and confidentiality, and possibly other losses
(lost income, loss of life, loss of real property). It should be pointed out
that it is not possible to identify all risks, nor is it possible to eliminate
all risk. The remaining risk is called "residual risk".
Controls
When management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls.Administrative
Administrative controls (also called procedural controls) consist of approved written policies, procedures, standards and guidelines. They inform people on how the business is to be run and how day to day operations are to be conducted. Laws and regulations created by government bodies are also a type of administrative control because they inform the business. Some industry sectors have policies, procedures, standards and guidelines that must be followed – the Payment Card Industry (PCI) Data Security Standard required by Visa and MasterCard is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies.Administrative controls form the basis for the selection and implementation of logical and physical controls. Logical and physical controls are manifestations of administrative controls. Administrative controls are of paramount importance.
Logical
Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls.An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task.
Physical
Physical controls monitor and control the environment of the work place and computing facilities. They also monitor and control access to and from such facilities. For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades, fencing, security guards, cable locks, etc. Separating the network and workplace into functional areas are also physical controls.An important physical control that is frequently overlooked is the separation of duties. Separation of duties ensures that an individual can not complete a critical task by himself. For example: an employee who submits a request for reimbursement should not also be able to authorize payment or print the check. An applications programmer should not also be the server administrator or the database administrator – these roles and responsibilities must be separated from one another.
Post a Comment