Information Systems Security
Information Systems Security
Information Systems Security
ICT NOTES
INFORMATION SYSTEM SECURITY
SECURITY GOALS
To retain a competitive advantage and to meet basic business requirements, organizations must endeavor to
achieve the following security goals.
1. Confidentiality
Protect information value and preserve the confidentiality of sensitive data. Information should not be
disclosed without authorization. Information the release of which is permitted to a certain section of the
public should be identified and protected against unauthorized disclosure.
2. Integrity
Ensure the accuracy and reliability of the information stored on the computer systems. Information has
integrity if it reflects some real world situation or is consistent with real world situation. Information should
not be altered without authorization. Hardware designed to perform some functions has lost integrity if it
does not perform those functions correctly. Software has lost integrity if it does not perform according to
its specifications. Communication channels should relay messages in a secure manner to ensure that
integrity. People should ensure the system functions according to the specifications.
3. Availability
Ensure the continued availability of the information system and all its assets to legitimate users at an
acceptable level of service or quality of service. Any event that degrades performance or quality of a system
affects availability
SECURITY POLICY
Security failures can be costly to business. Losses may be suffered as a result of the failure itself or costs can
be incurred when recovering from the incident, followed by more costs to secure systems and prevent further
failure. A well-defined set of security policies and procedures can prevent losses and save money.
The information systems security policy is the responsibility of top management of an organization who
delegate its implementation to the appropriate level of management with permanent control.
The policy contributes to the protection of information assets.
Its objective is to protect the information against all types of risks, accidental or intentional. An existing and
enforced security policy should ensure systems conformity with laws and regulations, integrity of data,
confidentiality and availability.
Key components of such a policy include the following
1. Management support and commitment – management should approve and support formal security
awareness and training.
2. Access philosophy – access to computerized information should be based on a documented ‘need-to-know,
need-to-do’ basis.
3. Compliance with relevant legislation and regulations
4. Access authorization – the data owner or manager responsible for the accurate use and reporting of the
information should provide written authorization for users to gain access to computerized information.
1
5. Reviews of access authorization – like any other control, access controls should be evaluated regularly to
ensure they are still effective.
GENERAL CONTROLS
They apply to all computerized applications and consist of a combination of hardware, software and manual
procedures that creates an overall control environment.
2
Types of general controls
Administrative controls
These are formalized standards, rules, procedures and control disciplines which are aimed at ensuring that the
organizations resources are properly used. They ensure that job functions are designed to minimize risk of
errors or fraudulent manipulation of organizations data
They include:
Administrative procedures – may be put in place by an organization to ensure that users only do that which
they have been authorized to do
Legal provisions – serve as security controls and discourage some form of physical threats
Ensuring that performance standards are clearly defined and frequently revised
Definition of procedures for recovering the systems in case of failure
Software controls
They are aimed at minimizing software failure. They are controls that monitor use of software to prevent
unauthorized access to system software, application software and data.
They include
Definition of passwords and data access permissions
Installation of antivirus programs
Hardware controls
They ensure that computer hardware is physically secure and check for equipment malfunctions.
They include
Locking of system units in cabinets to prevent theft of computer parts
Using surge protectors or uninterruptible power supply units (UPS) to protect the hardware from electrical
problems.
Implementation controls
These are controls that monitor the system development process at various stages to ensure that the process is
properly controlled and managed. They are commonly referred to as system development controls
They include:
Ensuring that users are involved in the development and implementation of systems.
Ensuring that systems are properly tested before they are delivered to the users.
Training of users to minimize user errors
Use of quality assurance techniques to ensure that the output is qualitative.
APPLICATION CONTROLS
IT application or program controls are designed to ensure the complete and accurate processing of data, from
input through output. They are controls over the input, processing and output functions
PROCESSING CONTROLS
They establish that the data to be processed is accurate, complete and has value before it can be processed.
They include data validation and data editing controls
3
Data validation identifies data errors, incomplete or missing data and inconsistencies among related data
items. Validation controls ensure that the data to be processed has value i.e will enable the organization to
achieve its objectives.
OUTPUT CONTROLS
They ensure that the results of processing are accurate, complete and properly distributed.
They include:
1. There should be guidelines on how, where and when to destroy output
2. The output should be clearly labeled with descriptive headings and processing dates.
3. There should be a distribution list to ensure that only those specified will receive the output
4. Those who attempt to access softcopy output should be required key passwords.
COMPUTER ABUSE
This is the commissioning of acts which are not illegal but are unethical using the computer system.
The two most common types of computer abuse are:
Spamming
This is the sending of unsolicited mass e-mail to people who have not requested for the messages.
4
Jamming
This is the use of software routines to tie up the computer that is hosting the website so that legitimate users
or visitors do not have access to the site.
RISK MANAGEMENT
Risk refers to participating in an activity whose outcome is uncertain or is likely to interfere with data security.
Risk management is the technique for identifying, assessing and mitigating the operational risk facing an
organization. It focuses on evaluating the impact of the risk and looking for ways of correcting it.
Principles of risk management
1. It should be systematic and structured
2. It should address all the uncertainties
3. It should be flexible or responsive to change
4. It should focus on creating value in the organization
5. It should be capable of continual improvement and enhancement
6. It should be tailored to meet specific objectives
RISK IDENTIFICATION
Risk identification is the process of documenting any risks that could keep an organization or program from
reaching its objective. It's the first step in the risk management process, which is designed to help companies
understand and plan for potential risks.
RISK ASSESSMENT
Risk assessment is a systematic process performed by a competent person which involves identifying,
analyzing, and controlling hazards and risks present in a situation or a place. This decision-making tool aims
to determine which measures should be put in place in order to eliminate or control those risks, as well as
specify which of them should be prioritized according to the level of likeliness and impact they have on the
business.
RISK MITIGATION
Risk mitigation, the third process of risk management, involves prioritizing, evaluating, and implementing the
appropriate risk-reducing controls recommended from the risk assessment process.
5
Risk mitigation options (strategies)
Risk mitigation is a systematic methodology used by senior management to reduce mission risk. Risk
mitigation can be achieved through any of the following risk mitigation options or strategies:
Risk Assumption.
To accept the potential risk and continue operating the IT system or to implement controls to lower the risk to
an acceptable level
Risk Avoidance.
To avoid the risk by eliminating the risk cause and/or consequence (e.g., forgo certain functions of the system
or shut down the system when risks are identified)
Risk Limitation.
To limit the risk by implementing controls that minimize the adverse impact of a threat’s exercising a
vulnerability (e.g., use of supporting, preventive, detective controls)
Risk Transference.
To transfer the risk by using other options to compensate for the loss such as purchasing insurance.
6
service. However, server mirroring is very expensive because each server must be mirrored by an identical
server whose only purpose is to be available in the event of a failure.