IT Security
IT Security
IT Security
Introduction ..
2-3
3-5
Goals of IT security ..
Integrity .
Confidentiality
Availability .
Non-repudiation ..
Authentication .
5
5
5
5
5
Issues/Consideration of IT
Technical Issues of IT Security ..
Individual Victimization and Damages .
Future Developments ..
Cultural, Sociological, and Political Implications and Control Issues
Insider threat isn't going away .
Cyber attacks, including government-sponsored, continue; education and standards
prioritized ..
Enterprises deploy faster response and recovery solutions ..
'Social' the new frontier for cyber crime
DDoS attacks get even bigger but Botnets stick around
Email is the primary mode of communication ...
Online searches are essential ..
The occasional breach is unavoidable
Prevent Computer Hacking on an Organization .
Social media a hackers favorite target ...
6-14
6
7
7
8
8
8
9
9
10
10
11
11
12
13
Potential Impact
14-16
14
15
15
15
16-17
References ..
18
Introduction
1
Security is a basic human concept that has become more difficult to define and enforce in the
Information Age. In primitive societies, security was limited to ensuring the safety of the group's
members and protecting physical resources, like food and water. As society has grown more
complex, the significance of sharing and securing the important resource of information has
increased. Before the proliferation of modern communications, information security was limited
to controlling physical access to oral or written communications. The importance of information
security led societies to develop innovative ways of protecting their information. For example,
the Roman Empire's military wrote sensitive messages on parchments that could be dissolved in
water after they had been read. Military history provides another more recent example of the
importance of information security. Decades after World War II ended, it was revealed that the
Allies had gained an enormous advantage by deciphering both the German and Japanese
encryption codes early in the conflict. Recent innovations in information technology, like the
Internet, have made it possible to send vast quantities of data across the globe with ease.
However, the challenge of controlling and protecting that information has grown exponentially
now that data can be easily transmitted, stored, copied, manipulated, and destroyed.
Within a large organization information technology generally refers to laptop and desktop
computers, servers, routers, and switches that form a computer network, although information
technology also includes fax machines, phone and voice mail systems, cellular phones, and other
electronic systems. A growing reliance on computers to work and communicate has made the
control of computer networks an important part of information security. Unauthorized access to
paper documents or phone conversations is still an information security concern, but the real
challenge has become protecting the security of computer networks, especially when they are
connected to the Internet. Most large organizations have their own local computer network, or
intranet, that links their computers together to share resources and support the communications
of employees and others with a legitimate need for access. Almost all of these networks are
connected to the Internet and allow employees to go "online."
Information technology security is often the challenge of balancing the demands of users versus
the need for data confidentiality and integrity. For example, allowing employees to access a
network from a remote location, like their home or a project site, can increase the value of the
network and efficiency of the employee. Unfortunately, remote access to a network also opens a
number of vulnerabilities and creates difficult security challenges for a network administrator.
It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer
is any device with a processor and some memory. Such devices can range from non-networked
standalone devices as simple as calculators, to networked mobile computing devices such as
smartphones and tablet computers. IT security specialists are almost always found in any major
enterprise/establishment due to the nature and value of the data within larger businesses. They
are responsible for keeping all of the technology within the company secure from malicious
cyber attacks that often attempt to breach into critical private information or gain control of the
internal systems.
The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
Ensures that only authorized users (confidentiality) have access to accurate and complete
information (integrity) when required (availability).
IT Security is the process of protecting the intellectual property of an organisation.
IT security is a risk management discipline, whose job is to manage the cost of
information risk to the business.
A well-informed sense of assurance that information risks and controls are in balance.
IT security is the protection of information and minimises the risk of exposing
information to unauthorised parties.
IT Security is a multidisciplinary area of study and professional activity which is
concerned with the development and implementation of security mechanisms of all
available types (technical, organisational, human-oriented and legal) in order to keep
information in all its locations (within and outside the organisation's perimeter) and,
consequently, information systems, where information is created, processed, stored,
transmitted and destroyed, free from threats.
Information security (infosec) is the set of business processes that protects information
assets regardless of how the information is formatted or whether it is being processed, is
in transit or is being stored.
Information security (IS) is designed to protect the confidentiality, integrity and
availability of computer system data from those with malicious intentions.
Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of
information security. This triad has evolved into what is commonly termed the Parkerian
hexad, which includes confidentiality, possession (or control), integrity, authenticity,
availability and utility.
IT security is Safe-guarding an organization's data from unauthorized access or
modification to ensure its availability, confidentiality, and integrity.
IT security also known as cybersecurity or coputer security, is the protection of
information systems from theft or damage to the hardware, the software, and to the
information on them, as well as from disruption or misdirection of the services they
provide.
This is the processing of It includes controlling physical access to the hardware, as well
as protecting against harm that may come via network access, data and code injection,[2]
and due to malpractice by operators, whether intentional, accidental, or due to them being
tricked into deviating from secure procedures.
It also refers to protection of data, networks and computing power. The protection of data
(information security) is the most important. The protection of networks is important to
prevent loss of server resources as well as to protect the network from being used for
illegal purposes. The protection of computing power is relevant only to expensive
machines such as large supercomputers.
4
Computer security is the process of preventing and detecting unauthorized use of your
computer. Prevention measures help you to stop unauthorized users (also known as
"intruders") from accessing any part of your computer system.
To prevent theft of or damage to the hardware
To prevent theft of or damage to the information
To prevent disruption of service
To prevent crackers from accessing a computer system, computer security individuals
need to block noncritical incoming ports on the firewalls. Moreover, the ports remaining
open need to be protected by patching the services utilizing those portsemail, Web
services, and FTP.
Goals of IT security
Information systems are generally defined by all of a company's data and the material and
software resources that allow a company to store and circulate this data. Information systems are
essential to companies and must be protected.
IT security generally consists in ensuring that an organization's material and software resources
are used only for their intended purposes.
IT security generally is comprised of five main goals:
Integrity: guaranteeing that the data are those that they are believed to be
Confidentiality: ensuring that only authorized individuals have access to the resources
being exchanged
Authentication: ensuring that only authorized individuals have access to the resources
Issues/Considerations
Technical Issues of IT Security
IT systems no longer serve the sole purpose of stabilizing a working environment. Instead,
they have become the very backbone of society. Vulnerable systems therefore pose a risk to
individuals, companies, and all kinds of modern infrastructure. The first section aims to
identify current risk patterns to IT systems, especially from a technical point of view.
The impact of cybercrime remains one of the unsolved questions of IT security. Often,
individuals are not even aware that they are victims of computer crime. Even if the
victimization is perceived, many businesses do not make reports to outside organizations,
either because they fear setbacks vis--vis their competitors or because they do not know to
whom to report. In other cases, the possible gain does not seem to be worth the effort. The
aim of the second section is to highlight questions regarding the extent of victimization.
Future Developments
While botnets and phishing scams are already well-known forms of computer criminality (at
least to experts), future threats still remain to be evaluated. The third section of the
conference highlights possible developments and implications.
The phenomena of cybercrime highlight various aspects of the medium Internet," some of
which can be described as dualisms, for example, use vs. abuse, control vs. freedom,
co-evolution of security measures and malware. The unique possibilities of the Internet and
the ubiquity of digital media open many different (legal, illegal, and grey) possibilities.
Society has to cope with those challenges. Furthermore, a successful fight against computer
crime and its repercussions can only be fought if the underlying aspects (e.g., phenomena,
extent, and possible future threats) are known, and a successful fight can only take place on
an international scale since individual actions undertaken at the national level are doomed to
failure from the very beginning. The fourth section will cover current and developing
measures against computer crime.
Companies should know who they are giving their data to and how it is being protected," said
Tim Ryan, managing director and cyber investigations practice leader at US-based risk
mitigation and response firm Kroll. "This requires technical, procedural and legal reviews.
There are many threats for the IT. That are increasing day by day. For those, IT security is
more important.
As states compete to become credible world players we can expect to see further
announcements by various states regarding their offensive and defensive strategies. Cyber is
the new battlefield, and the fifth element of warfare. As such, it's likely that future conflicts
will involve cyber battles and because of this, states will be - and already are - pouring a
huge range of resources into developing defence and offence capabilities for cyber war. For
protecting cyber war we have to ensure IT security.
"We've seen a dramatic improvement in response technology over the last year," says Ryan.
"Companies have never had a better opportunity to enhance their existing protocols with a
methodology that can mean an informed and timely response." "Companies will gain a better
understanding of their actual breach risks, how the breach could actually affect their
customers, and the best way to remedy those specific risks and provide better protection to
affected customers," he adds.
'Social' the new frontier for cyber crime
Cyber criminals will increasingly attack social platforms in 2014. We predict many of the
cyber crime tactics that are successful when targeting social networking users will be applied
in new, innovative ways within professional social networks, reads a forecast report from
Websense. Indeed, other studies suggest that the frequency of cyber attacks will be so
9
common that consumers will face data breach fatigue, meaning they'll be less likely to
protect themselves.
Distributed denial of service (DDoS) attacks were a big deal in 2013 and could be even more
prominent in 2014 NASDAQ temporarily went down as a result of an attack in August,
while Dutch web hosting company CyberBunker caused a global disruption of the World
Wide Web with a massive DDoS attack of its own.
Ensuring that your information remains confidential and only those who should access
that information, can.
Making sure that your information is available when you need it (by making back-up
copies and, if appropriate, storing the back-up copies off-site).
Email is the primary mode of communication
Email serves the same purpose at most organizations that phone calls and corporate memos
did in the 1990s. Because there is proprietary information being passed back and forth, each
organization assumes the responsibility of ensuring every email account is secure. Security
specialists may be asked to help onboard the system, and then protect the organization from
potential risks as they arise. In the event that an employees email is breached, its up to the
specialist to identify and eradicate the problem. Once thats done, the next priority
becomes ensuring that all the other in-house accounts remain secure from that threat as well.
Risk Management
10
Employees at many organizations are required to do some online searches. The problem is
that the more searches that are done, the higher the risk that an individual might click on a
contaminated link. Within minutes the entire computer could be infected. Network
specialists are trained to set up firewalls that can either warn users of a potential threat before
allowing them to access a page, or forbid them from accessing any unsecure pages altogether.
This minimizes the organizations exposure and forces every user to think twice before
clicking.
The larger the organization, the more common it is for a simple virus to infect the system.
Network specialists are there to put out the fire when it does occur, and theyre essential to
the organization in that manner. Depending on the specialists role, this may mean accepting
the occasional independent contract, or it may mean working for an employer full-time. The
most important duty for a full-time specialist is to keep an eye out for emerging threats
before they arise. Lost or breached information can represent a major expense, and the more
vigilant a networking specialist, the less exposed any organization will be.
A threat is a possible danger to the system. The danger might be a person (a system
cracker or a spy), a thing (a faulty piece of equipment), or an event (a fire or a flood) that
might exploit a vulnerability of the system.
11
In addition the monetary cost arisen from computer hacking, instances of hacking costs
organizations considerable amounts of employee time, resulting in the loss of yet more money.
While large businesses possess the financial framework to absorb such costs, the loss of revenue
and employee time may prove markedly detrimental to small organizations.
12
Potential Impact
Beneficial or Positive Impact of IT security in our Society
Any professional individual like doctors, engineers, businessmen etc. undergo a change in their
style or working pattern after they get the knowledge of computer.
An individual becomes more competent to take a decisions due to the computer because all the
information required to take the decision is provided by the computer on time. As a result, any
individuals or institutions get success very fast.
The person working at the managerial level becomes less dependent on low level staff like clerks
and accountants. Their accessibility to the information increases tremendously. This improves
their working patters and efficiency, which benefit the organization and ultimately affects the
society positively.
In common life also, an individual gets benefited with computer technology. When airports,
hospitals, banks, departmental stores have been computerized, people get quick service due to
the computer system.
Computers have created new fields of employment. These employments are in the field of
designing, manufacturing, teaching, etc.
People do not use their mind for common arithmetic, which gradually results in loss of their
numerical ability.
Today, any person who does not have the knowledge of computer is considered the second class
citizens.
People have fear that growing children may lose their common sense abilities like numerical
ability due to total dependence on computers.
Due to the computerization workload for the employees reduces many times. As a result, many
organization may require to remove some of its employees. It produces the dissatisfaction and
lack of security among the employees. Due to this, employees do not corporate the organization.
As a result, the output can be disastrous.
As a result of introduction of new technology in an organization, the organization may need to
spend a tremendous amount on the training of its employees.
Conclusion
As Internet use is developing, more and more companies are opening their information system to
their partners and suppliers. Therefore, it is essential to know which of the company's resources
need protecting and to control system access and the user rights of the information system. The
same is true when opening company access on the Internet.
Moreover, because of today's increasingly nomadic lifestyle, which allows employees to connect
to information systems from virtually anywhere, employees are required to carry a part of the
information system outside of the company's secure infrastructure. The security policy is all of
the security rules that an organization (in the general sense of the word) follows. Therefore, it
must be defined by the management of the organization in question because it affects all the
system's users.
In this respect, it is not the job of the IT adminstrators to define user access rights but rather that
of their superiors. An IT administrator's role is to ensure that IT resources and the access rights to
these resources are in line with the security policy defined by the organization.Moreover, given
that he or she is the only person who masters the system, he or she must give security
information to the management, advise the decision makers on the strategies to be implemented,
and be the entry point for communications intended for users about problems and security
recommendations. IT security specialists are almost always found in any major
enterprise/establishment due to the nature and value of the data within larger businesses. They
are responsible for keeping all of the technology within the company secure from malicious
cyber attacks that often attempt to breach into critical private information or gain control of the
internal systems. Within a large organization information technology generally refers to laptop
and desktop computers, servers, routers, and switches that form a computer network, although
information technology also includes fax machines, phone and voice mail systems, cellular
phones, and other electronic systems. A growing reliance on computers to work and
communicate has made the control of computer networks an important part of information
security. Unauthorized access to paper documents or phone conversations is still an information
technology security concern, but the real challenge has become protecting the security of
computer networks, especially when they are connected to the Internet. Most large organizations
have their own local computer network, or intranet, that links their computers together to share
resources and support the communications of employees and others with a legitimate need for
access. Almost all of these networks are connected to the Internet and allow employees to go
"online."
Information technology security is controlling access to sensitive electronic information so only
those with a legitimate need to access it are allowed to do so. This seemingly simple task has
become a very complex process with systems that need to be continually updated and processes
16
that need to constantly be reviewed. There are three main objectives for information technology
security: confidentiality, integrity, and availability of data. Confidentiality is protecting access to
sensitive data from those who don't have a legitimate need to use it. Integrity is ensuring that
information is accurate and reliable and cannot be modified in unexpected ways. The availability
of data ensures that is readily available to those who need to use it (Feinman et. al., 1999).
Information technology security is often the challenge of balancing the demands of users versus
the need for data confidentiality and integrity. For example, allowing employees to access a
network from a remote location, like their home or a project site, can increase the value of the
network and efficiency of the employee. Unfortunately, remote access to a network also opens a
number of vulnerabilities and creates difficult security challenges for a network administrator.
References
17
18