The Regulatory Environment in Information Security by Husin Jazri
The Regulatory Environment in Information Security by Husin Jazri
By Husin Jazri
Data Protection
The main purpose of the Act is to preserve privacy and enable the
enforcement of information processing standards. Two main players involved
are the data users and the data protection registrar. Data users are
responsible for the personal data. These personal data must be :
1. Refusal of registration.
2. Enforcement notice to comply with principles.
3. Transfer prohibition notice.
4. De-registration notice.
5. Prosecution.
1
The registration process includes identification of all computerized
personal data and details about the data usage such as to whom disclosures
are planned. Registration can be rejected if information furnished to the
registrar is incomplete, false or misleading. Exemptions from the provision of
the act are granted for national security, individuals, clubs and preparations of
the text document. Partial exemption is allowed for crime tracking, statistics,
research studies, examination marks and backup data. These partial
exemptions should be allowed in a controlled manner and usually with the
authority of the jurisdictional entities.
4. Definition of Unauthorized :
a. Objective test :
• Not entitled to control access of the kind in question or
modification.
b. Subjective Test :
• Must know he is unauthorized.
2
control is always national security. The objective of the control at first was to
restrict algorithms but it was not quite successful and now the trend is going
towards enabling access to keys (under warrant) known as key escrow.
The main criticism on TCSEC are that the DoD Security Policy is
assumed throughout. This may not be suitable to the ‘non military’
organization. It emphasizes stringently on confidentiality, has no commercial
involvement and mainframe oriented. Also, the Orange Book only applied to
stand-alone systems, and ignored the connectivity requirements. Whatever
the criticisms are, it is obvious that the Orange Book has become an
important reference for security evaluation and formulation of the later
standards.
3
function but is still structured. Basically it carries the same language and style
of the Orange Book.
The Criteria is a joint project between NIST and NSA to replace the
‘Orange Book’. It leads to a new Federal Information Processing Standard.
This criteria can be used as a standard for design and development of trusted
products and systems. It also has protection profile which covers
development, analysis and registration.
4
PROFESSIONAL ACCREDITATION
CONCLUSION
References :
1. http://www.mycert.org.my/crime.html
2. http://www.commoncriteria.org/cc/cc.html
3. http://www.itsec.gov.uk/docs/formal.htm
4. http://www.dynamoo.com/orange/index.htm
5. Secrets and Lies, Digital Security in a Networked World, Bruce
Schneier, Wiley Computer Publishing; 2000. (ISBN 0-471-25311-1)
6. Internet Security Advisor Magazine, November/December 2000.