1bcom_sem3_unit3_notes
1bcom_sem3_unit3_notes
Electronic Payment: Business and Money, the Payment Challenge, Payment Procedures,
Receivables Management, Cyber Money
Risk analysis
A risk analysis according to ISO/IEC 27001 (IEC = International Electro-technical
Commission, ISO = International Organization for Standardization) has to run through
the following steps:
• Inventory of information assets,
• Determination of protection requirements,
• Identification and assignments of threats
• Identification and assignment of weaknesses,
• Determination of potential extent of loss,
• Determination of probabilities of loss occurring,
• Determination of risks,
• Decision on acceptance of risk,
• Selection of safeguards,
• Documentation of residual risks,
• Documented approval of management.
COMPLIANCE MANAGEMENT
In general, compliance means conforming to a rule, such as a specification, policy, standard or law.
Regulatory compliance describes the goal that organizations aspire to achieve in their efforts to ensure
that they are aware of and take steps to comply with relevant laws and regulations
- Protection goals
With respect to information there are several common protection goals:
• Authenticity: Realness/credibility of an object/subject, which is verifiable,
• Integrity: Data cannot be manipulated unnoticed and without proper authorization,
• Confidentiality: Information retrieval not possible without proper authorisation,
• Availability: Authenticated and authorized subjects will not be restricted in their rights without
proper authorization,
• Obligation: A transaction is binding if the executing subject is not able to disclaim the transaction
afterwards,
• Authorization: Power and right to conduct an activity.
- Objectives of ISM
The overall objective of information security management is to protect the information assets of the
organization due to the above-mentioned protection goals.
This leads to specific ISM objectives:
• Fulfil organizational duties: give precise, binding and complete orders to your people; select people
carefully with respect to duties and responsibilities
• Build an efficient and transparent organization.
• Build a professional security, continuity and risk management.
• Increase efficiency with general and unified rules and methods.
• Reduce time consumption and costs with security and security audits integrated into business
processes.
• Run a continual improvement process to minimize risks and maximize economic Efficiency
• Have a good reputation at customers, shareholders, authorities and the public.
• Parry liability claims and plead the organization in criminal procedures.
• Be integrated into the corporate security management system
- ISM Process
The information security management process has four major steps, which are subsequently
described:
• Initialize:
o Understand information security requirements,
o Build information security policy to define overall security objectives,
o Establish information security representative and organization,
• Analyse and develop information security strategy:
o Determine protection needs,
o Analyse threats,
o Analyse risks,
o Deduce information security requirements
-ISM ACTIONS
Information security management includes a great variety of activities, which can be categorized due
to the focus of the different activities.
Organization:
• Establish access profiles.
• Provide and file task descriptions for IT administrators and information security representatives.
• Conduct administration of keys.
• Run evacuation and emergency exercises.
Technique:
• IT security: Implement and operate firewalls, virus scanner, spam filter, encryption software.
• Facility management: Install access control system, door locks, fire detection system, burglar alarm
system, emergency power generator, uninterruptable power supply (UPS).
• Safety of buildings: Install fences, observation cameras.
People:
• Conduct a professional recruiting and include security aspects.
• Do a proper placement of employees (duties of employees).
• Ensure a careful adjustment to the job.
• Establish a continuous supervision: rising of awareness, training.
• Conduct a professional separation of employees.
-ISM DOCUMENTS
A professional information security management will lead to several documents:
• Information Security Process Framework,
• Information Security Declaration:
o Requirements to information security, continuity and risk management with respect to risk
capacity, risk propensity und aspired security level: corporate principles, corporate objectives,
requirements of stakeholders, requirements through laws, regulations and standards,
o Description of ISM process with continual improvement process, organization and
responsibilities,
o Responsibility of top management,
o Integrated, transparent and auditable process model: information security principles, processes
and organization, technical resources, employees and external experts, life cycle,
communication, training, motivation, raising of awareness, surveys, Commitment of
employees,
o Penalties,
• Information security concepts (e.g. job safety, human resources, facility management, IT security),
• Subject oriented concepts (e.g. virus protection, network, E-Mail or IT processes),
• Policies/guidelines:
o End user policy incl. password policy and Internet policy,
o Communication policy incl. communication with external parties and E-Mail policy,
o Access authorization for buildings and rooms (incl. request and authorization process),
o Firewall policy,
o Backup policy incl. off site storage of backup data,
o Access authorization for IT systems and networks (incl. request and authorization
o process),
o Access protection of data (incl. request and authorization process),
o Encryption policy,
o Emergency plan (incl. alerting, emergency operation, transformation to regular
o operation),
o Configuration of security related facilities,
o Fire protection,
o Sourcing policy
TECHNOLOGY