INFO5301 Lecture1 S1 2020 v1 PDF
INFO5301 Lecture1 S1 2020 v1 PDF
INFO5301
Semester 1, 2020
Lecture 1
Information System Security: Nature and Scope
1
Why study information security?
2
Umbrella of Information Security
3
Information System Security :
Nature and Scope
Learning Objectives
Understanding….
• information systems in organisations
• roles of information systems in organisations
• types of information systems
• technical, formal, and informal controls
• importance of coordinating and maintaining the integrity of
operations within and between the three levels of systems
4
Organisations and information systems
10
10
5
Types of Information Systems
Informal System
11
11
12
12
6
Types of Information Systems
Co-ordination between Systems
Informal System
Formal System
Technical
System
13
13
14
14
7
Information Security in 3-Systems Model
15
15
16
16
8
Information Security in 3-Systems Model
Technical Controls
• End-point security
• Malicious content control
17
17
18
18
9
Information Security in 3-Systems Model
Formal Controls
• Support technological controls
• Approach at organisational level
• Implementing structured IS management
• Giving strategic direction
• Representation from a wide range of functional areas
• Hiring and termination standards
• Fair Practices and moral leadership
• Protect management from claims of negligent duty
• Compliance with the requirements of data protection legislation
19
19
20
20
10
Institutionalising Information Security
• Organisational structure
• Policy and Procedural framework
• Linking access rights to the hierarchical level
• For efficiency and effectiveness purposes
• The reality is more complex than formal or the technical
aspects of the system
• Maintaining consistency in communication
• Ensuring proper interpretation of information
• Ethics and trust
21
21
Reference Links:
• https://www.schneier.com
• https://krebsonsecurity.com/
• https://www.securityfocus.com/
• https://www.isaca.org/
• https://slashdot.org/
• https://www.asd.gov.au/
• https://www.oaic.gov.au/
• https://www.auscert.org.au/
• https://www.nist.gov/topics/cybersecurity
• https://www.helpnetsecurity.com
• Vendor sites such as Cisco, Juniper, Symantec, McAfee,
IBM, etc. 22
22
11
References – Lecture 1
23
23
Discussion Questions
24
24
12
Q 1) Even though information system security goes way beyond the
security of the technical edifice, applications and organisation
resources can only be protected by using the latest security
gadgets. Isn’t this a contradiction in itself?
Discuss.
25
25
26
26
13
Q 3) Do we really need to understand and place high importance on the
informal controls prior to establishing security rules?
why? / why not?
27
27
28
28
14