Information System Security 2
Information System Security 2
Information System Security 2
Mjema)
Information system security is protecting information (data) and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction.
Information Security management is a process of defining the security controls
in order to protect the information assets.
Analysts should be involved with the security of database and network systems.
Security responsibility covers a number of areas such as;
The primary involvement is in application security- which includes access security,
data security, and functional screen security.
Access security- regulates who is authorized to use an application.
Data security - covers transaction data and stored data across the
Web system, and how to validate and secure it.
Functional screen security- involves determining what features and
functions are made available to which users within an application.
In addition, the analyst must also participate in network design decisions and
decisions about what hardware and operating system conventions should be
implemented to help protect the systems from vulnerabilities in browsers, servers,
protocols, and firewalls.
Security measure organisation must take to ensure information system are secured;
these measures are security trios which are Confidentiality, Integrity and Availability
Confidentiality
Means protecting information and information systems from unauthorized access.
Organisation should be able to restrict access to those who are allowed to access
information of information system. everyone else should be disallowed from
accessing. This is the essence of confidentiality. For example, for systems which are
centralized and implemented in network environment in a special room called server
room or data centre, access to the room/centre should be restricted only to
authorized user in order to protect those systems.
Integrity
Integrity is the assurance that the information being accessed has not been altered
and truly represents what is intended. Just as a person with integrity means what he
or she says and can be trusted to consistently represent the truth, information
integrity means information truly represents its intended meaning. Information can
lose its integrity through malicious intent, such as when someone who is not
authorized makes a change to intentionally misrepresent something. An example of
this would be when a hacker is hired to go into the university’s system and change a
grade.
Integrity can also be lost unintentionally, such as when a computer power flow
corrupts a file or someone authorized to make a change accidentally deletes a file or
enters incorrect information.
Availability
Information availability is the third part of the CIA trios. Availability means that
information can be accessed and modified by anyone authorized to do so in an
appropriate timeframe. Depending on the type of information, appropriate timeframe
can mean different things. For example, banking systems for deposit and withdraw
money inside banks where a banker do transactions for a customers, these kind of
system are required to me up and running for a certain time may be from 8: 30 AM
to 04:30 PM depending on working hours for a specific bank so these system are
expected to be off on 04:30 PM. But in other case the same banking system for
deposit and withdrawing money in ATM system, these systems are supposed to be
up and running which means available all the time means 24/7.
To ensure the confidentiality, integrity, and availability of information, organizations
can choose from a variety of tools or security controls.
1. Authentication
The most common way to identify someone is through their physical appearance,
but how do we identify someone sitting behind a computer screen or at the ATM?
Tools for authentication are used to ensure that the person accessing the
information is, indeed, who they present themselves to be.
Authentication can be accomplished by identifying someone through one or more of
three factors:
something they know
something they have
something they are.
For example, the most common form of authentication today is the user ID and
password.
In this case, the authentication is done by confirming something that the user
knows (their ID and password). But this form of authentication is easy to
compromise (see sidebar) and stronger forms of authentication are
sometimes needed.
Identifying someone by something they have, such as a key or a card.
The final factor, something you are, is much harder to compromise. This
factor identifies a user through the use of a physical characteristic, such as an
eye-scan or fingerprint. Identifying someone through their physical
characteristics is called biometrics.
2. Access Control
Once a user has been authenticated, the next step is to ensure that they can only
access the information resources that are appropriate. This is done through the use
of access control. Access control determines which users are authorized to read,
modify, add, and/or delete information.
3. Encryption
Many times, an organization needs to transmit information over the Internet or
transfer it on external media such as a CD or flash drive. In these cases, even with
proper authentication and access control, it is possible for an unauthorized person to
get access to the data.
Encryption is a process of encoding data upon its transmission or storage so that
only authorized individuals can read it.
This encoding is accomplished by a computer program, which encodes the plain text
that needs to be transmitted; then the recipient receives the encrypted text and
decodes it (decryption). In order for this to work, the sender and receiver need to
agree on the method of encoding so that both parties can communicate properly.
Both parties share the encryption key, enabling them to encode and decode each
other’s messages. This is called symmetric key encryption. This type of
encryption is problematic because the key is available in two different places.
An alternative to symmetric key encryption is public key encryption.
Public key encryption means two keys are used which a public key and a
private key, to send an encrypted message. This is done by a sender obtaining
the public key, encode the message and send it. The recipient then uses the
private key to decode it.
The public key can be given to anyone who wishes to send the recipient a
message. Each user simply needs one private key and one public key in order
to secure messages. The private key is necessary in order to decrypt something sent
with the public key.
4. Backups
Another essential tool for information security is a comprehensive backup plan for
the entire organization. Not only should the data on the corporate servers be backed
up, but individual computers used throughout the organization should also be
backed up. A good backup plan should consist of several components.
Regular backups of all data
The frequency of backups should be based on how important the data is to the
company, combined with the ability of the company to replace any data that is
lost. Critical data should be backed up daily, while less critical data could be
backed up weekly.
Offsite storage of backup data sets
If all of the backup data is being stored in the same facility as the original copies
of the data, then a single event, such as an earthquake, fire, or tornado, would
take out both the original data and the backup! It is essential that part of the
backup plan is to store the data in an offsite location.
Test of data restoration
On a regular basis, the backups should be put to the test by having some of the
data restored. This will ensure that the process is working and will give the
organization confidence in the backup plan.
5. Firewalls
Another method that an organization should use to increase security on its network
is a firewall. A firewall can exist as hardware or software (or both).
Hardware firewall- is a device that is connected to the network and filters
the packets based on a set of rules.
Software firewall- runs on the operating system and intercepts packets as
they arrive to a computer.
A firewall protects all company servers and computers by stopping packets from
outside the organization’s network that do not meet a strict set of criteria. A firewall
may also be configured to restrict the flow of packets leaving the organization. This
may be done to eliminate the possibility of employees watching YouTube videos or
using social media from a company computer.
Demonstration of firewall
6. Virtual Private Networks
Using firewalls and other security technologies, organizations can effectively protect
many of their information resources by making them invisible to the outside world.
But what if an employee working from home requires access to some of these
resources? What if a consultant is hired who needs to do work on the internal
corporate network from a remote location? In these cases, a virtual private network
(VPN) is needed.
A VPN allows a user who is outside of a organisation network to take a bypass
around the firewall and access the internal network from the outside. Through a
combination of software and security measures, this lets an organization allow
limited access to its networks while at the same time ensuring overall security.