Final Report of IT Security
Final Report of IT Security
Introduction:
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...). Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber-attacks that often attempt to breach into critical private information or gain control of the internal systems. The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to; natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arises.
IT Security
Page 1
Exposure of IT systems IT systems need a stable environment. Organizations rely upon the accuracy of information provided by their systems. Investment in IT systems Information systems are costly both to develop and maintain, and management should protect their investment like any other valuable asset.
IT Security
Page 2
I.
Information Security Structure: The objective is to deal with management of information security within the organization. A management framework should be established to initiate and control the implementation of information security within the organization Review to IS Management course. Security of 3rd Party Access:
II.
The objective is to maintain security of organizational information processing facilities accessed by third parties. Access to organizations information processing facilities by third parties should be controlled.
III.
Outsourcing: The objective is to maintain security of information when responsibility for processing is outsourced.
IT Security
Page 3
IT Security
Page 4
6. Communications and operations management - management of technical security controls in systems and networks. 7. Access control - restriction of access rights to networks, systems, applications, functions and data. 8. Information systems acquisition, development and maintenance - building security into applications. 9. Information security incident management - anticipating and responding appropriately to information security breaches. 10. Business continuity management - protecting, maintaining and recovering businesscritical processes and systems. 11. Compliance - ensuring conformance with information security policies, standards, laws and regulations.
2.4.2 COBIT:
Control Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. Newest: COBIT 5 Widely used: COBIT 4.1 Framework Control Objectives Management Guidelines Maturity Models
IT Security
Page 6
2.6 Risk:
Risk in IT combination of threat, vulnerability, and impact. Threat an unwanted that could remove, disable, damage, or destroy an IT asset. Vulnerability a weakness that could be exploited by a threat. Impact the consequences of vulnerability in a system being exploited by a threat.
IT Security
Page 7
IT Security
Page 8
Conduct cost-benefit analysis To allocate resources and implement cost-effective solutions, organizations should conduct a cost-benefit analysis for each proposed control. Select control On the basis of the results of the cost-benefit analysis, management selects the cost-effective controls for reducing risks. Assign responsibility Responsibility should be assigned to in-house experts or an outside agency which have the appropriate skill set and expertise to implement the selected control. Develop safeguard implementation plan The safeguard implementation plan prioritizes the implementation actions and projects the start dates and the target completion dates. Implement selected controls The selected controls should be implemented so that the risks are brought down within the acceptable levels.
IT Security
Page 10
3.1 Conclusion:
Information security is the ongoing process of exercising due care and due diligence to protect information, and information systems, from unauthorized access, use, disclosure, destruction, modification, or disruption or distribution. The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. This makes information security an indispensable part of all the business operations across different domains. With the use of the advanced technologies the information security systems provides a high level confidentiality, integrity and safety services.
IT Security
Page 11
3.2 Bibliography:
IT Security
Page 12
3.3 Glossary:
COBIT- Control Objectives for Information and Related Technology. IEC- International Electrotechnical Commission. ISDN- Integrated Services Digital Network. ISO- International Organization for Standardization. IT- Information technology. RM- Risk Management.
IT Security
Page 13