You are on page 1of 6

138

International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

Setting up a Secure Information System Using


Information Security Management
Abdisalam M Issa-Salwe1
1
Taibah University, College of Computer Science & Engineering,
Al-Madinah Al-Munawwarah, P O Box 30002, Kingdom of Saudi Arabia
a.issasalwe@taibahu.edu.sa

Abstract – The security attention in information systems has measures to ensure the availability, integrity and
grown in recent years according to their diffusion, the growing role confidentiality of information. It is essential for
they have in contexts in which they operate and their increasing organisations to plan ahead against security breaches.
complexity and exposure to possible attacks. This leads Information
To follow this course, a contractor may offer a range of
security not to be any longer a technology-focused problem as it has
become the basis for business survival. Information Security technical protection or firewall encryption. However, it is
Policies are the basis for a reliable information security scheme and important to realise that the use of these techniques or
are critical to protect the organisation’s information system other security requires careful and systematic planning.
resources and data. This paper analyses the need for organisation This leads to be able to implementation an optimal and
the benefit of setting a strong Information Security Policies to appropriate control within the organisation.
prevention system attacks rather than focusing on the detection
The security policy of the organisation, in the context of
system.
IS, is to ensure information resources to be available to the
Keywords: Information System security, Security Policy, authorised user. It must provide each user its level of
Strategic security plan, Risk assessment. accessibility rights, on time and in the way agreed. In IS, the
availability requirements are also linked to the performance,
1. Introduction and strength laid down by the security policy. The
availability of information to a user must be ensured without
interruption throughout the period provided (this is also
Information security is the protection of information from
known as service continuity). The success of the availability
threats in order to ensure business continuity by reducing
depends on factors such as the critical strength of the basic
business risk, and maximising return on investments and
software and application, and equipment reliability.
business opportunities. In modern times, information is
It is important not to assume that countermeasures in an
exposed to a growing number of threats. Information Security
information system are sufficient to prevent any attacks. To
Policies are the basis for a reliable information security
ensure a system, potential threats must be identified so as to
scheme and are critical to protect the organisation’s
identify and anticipate the enemy's course of action. [25] The
information system (IS) resources and data. IS are generally
system must prevent the direct or indirect alteration of the
defined by an organisation's asset that allows a company care
information, both by unauthorised users and processes, and
an organization’s business and consequently, needs to be
pursuant to accidental or negligence. The system must
suitably protected. This is especially important in the
prevent any person from obtaining, directly or indirectly,
increasingly interconnected business environment. As IS are
information that is not authorised to access.
vital to organisation it must be protected. In this case,
Information security refers to all aspects of protection
information system security generally consists in ensuring
covering information and IS from unauthorised access, use,
that an organisation's material and software resources are
disclosure, disruption, modification, or destruction. Here the
used only for their intended purposes [25].
aim is to provide confidentiality, integrity, and availability of
The security attention in IS has grown in recent years
IS and the information within. [24] [24]
according to their diffusion, the increasing role they have in
A comprehensive Information Security management
contexts in which they operate and their increasing
strategy should be based on security architecture of the
complexity and exposure to possible attacks. [1] In strategic
organisation. [26] According to Grobler and Louwrens
terms, it must be emphasised alongside the availability and
(2009), this architecture “…is not something one can
integrity of information, often crucial to ensure continuity.
purchase. It is the process developing an awareness of risk,
This paper analyses the need for organisation the
an assessment of the current controls, and the alignment
adavantage of setting a robust Information Security Policies
controls to meet the requirements of the organisation…”
to prevention system attacks rather than focusing on the
[27]. They argues to have a strong Information Security
detection system.
Architecture the corporate Information Security Management
should be based on the sound implementation of security
2. Background technology. [26]
Research on security policy has been focusing on a small
According to International Organization for level rather than organisational security policies. [6]
Standardization (ISO) definition, security is the set of Computer security is a very spreading field. It has been
139
International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

examined by cryptographers, computer scientists and order to have an organisation evaluated or certified to safety
electrical engineers. Because of this diversity and a standards, or to obtain a security label of its indebtedness, it
fragmentation studies on information security, there is a should demonstrate to its customers and partners business,
serious need to make sense of the subject as a whole. they are trustworthy, at least when it comes to security. [4]
Existing literature focuses on certain sub-sectors of the The initial risk assessment should describe the threat
security mechanisms of information, such as access control environment in which the system works and the possible
[11, 12], development of IS and security and encryption. [13, vulnerabilities which may occur. [22] This assessment should
15], Nevertheless, a comprehensive analysis of contributions be followed by an initial identification of requisite security
in the field of security of IS is lacking. [4] Because the many controls that will defend the system in its operational
existing approaches and security [5], the concern must be environment. [22]
given serious attempt to increase our understanding of their In terms of security is generally characterised by the
strengths and weaknesses. [4, 17, 18] following equation:
Herrmann and Pernul suggest a framework where security
(mainly confidentiality) and integrity requirements of R = (M x V)/C
business processes can be modeled [6]. This structure Where R = Risk, M = Menace, V = Vulnerability, and C =
consists of a three-layered architecture for business process Countermeasure
security. In layer three, the high-level security requirements
of business processes are graphically analyzed. In the second
layer, these are translated into more a formal, intermediate Menace * Vulnerability
Risk =
language, and the security elements are identified and divided Countermeasure
into security blocks.
At level three, the security requirements of high-level The threat corresponds to the type of threat that could be
business processes are also analysed graphically. In the damaged, whereas the vulnerability is the level of exposure
second level, these are translated into a formal intermediate to threats in a particular context. Finally, the countermeasure
language, and security features are identified and divided into is any action taken to prevent the threat. [25]
blocks of security. [6, 19] This structure covers (i) the Countermeasures to be implemented are not only forwarded
outlook of the information representing the entities and their as technical solutions, but they also include user training and
relationships, (ii) the functional of processes and data flows awareness, and a well-defined procedure. Awareness must be
between different activities, (iii) dynamic of the possible such that information resource custodians, users, providers
states of each entity of information, (iv) organisational and management are informed of their respective
influence described as role models, and (v) processes of responsibilities for protecting information resources.
business perspective. [6, 19] The purpose of this selection is to identify the subset of
In general, the objective of information security is to minimum cost while respecting some constraints essential as
protect organisational activities to ensure business continuity, the following,
minimise business damage and maximise return on
investment (as defined by ISO 17799). This practice focuses • Completeness: the subset of countermeasures must meet
on areas commonly accepted in the community of all adverse events identified for the system under
information security: risk management, confidentiality, consideration.
integrity and availability protection/ response intrusion • Homogeneity: the countermeasures to be taken must be
detection, identification and authentication, access control, compatible and integrated with each other to minimize
administration of forest safety security. the cost of implementation.
• Controlled redundancy: the action should be measured
and weighed carefully. Some countermeasures might be
3. Setting the Security unnecessarily redundant as they may neutralise the some
of same event rated as "low risk”.
The Information system security is generally limited to • Effective viability: the set of countermeasures must
guaranteeing the right to access a system's data and resources respect the constraints of logistics and administrative.
by setting up authentication and control mechanisms that
ensure that the users of these resources only have the rights Selected countermeasures should be integrated into the
that were granted to them. [25] Yet security mechanisms can broader framework of a comprehensive policy that places
create difficulties for users. Instructions and rules often safety and warrants as part of a unified design. For each
become increasingly complicated as systems grow. Thus, countermeasure, in essence, must be shown the precise role it
Information system security must be studied in such a way occupies in relation to other countermeasures and guidelines,
that it does not prevent users from developing uses that they which meets the overall design.
need and so that they can use IS securely. Security incident handling begins with planning and
The proposal that all organisations should put into practice preparing the right resources, then developing proper
security practices means that it is possible to find a generic or procedures to be followed, such as escalation and security
universal set of IS procedures and best practices. [4, 21] In incident response procedures (see Figure 1). When a security
incident is detected, a security incident response is initiated
140
International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

by responsible parties using predefined procedures. A damage and restore the conditions violated as soon as
security incident response represents the activities or actions possible. [1, 2] It is very important that these measures are
carried out to tackle the security incident and to restore the taken in a systematic way, as part of a broader security
system to normal operation. Specific incident response teams policy, and in compliance with the technical settings.
are usually established to perform certain tasks within the One of the major concerns in considering a system’s
security incident. When the incident is over, follow up action vulnerabilities would be how to protect assets of the
is taken to evaluate the incident and to strengthen security system.[21] Resources are possessions with potentially value
protection against a recurrence. Planning and preparation to the system. [21] In an organisation, the resources of an
tasks will be reviewed and revised accordingly to ensure that information system are the entities which provide the
there are sufficient resources available (including manpower, operation. From a safety perspective, it is important to
equipment and technical knowledge) along with properly distinguish between resources that constitute the system and
defined procedures to deal with similar incidents in the the resource they need to work. [6] It must be anticipated,
future. identified and assessed the aspects which can be linked to
events that could threaten the integrity of the system
Figure 1: Handling Security resources. [1] A classification of types of common resources
of system information is useful to proceed in a systematic and
comprehensive way. Of particular interest, it must be
distinguished between physical and logical resources. [1, 4,
6, 21]
The physical resources usually present in a modern
information system are computers (i.e. servers and
workstations), peripherals (i.e. scanners, printers, and
modems), network equipment, the premises that house the
equipment and facilities. It is worth noting that even human
operators can be considered in certain aspects as physical
resources. [2] The logical resources present are typically
application software and basic software (DBMS, OS, and
Software), databases, the configuration registers of devices.
Source: InfoSec, http://www.infosec.gov.hk/english/faq/faq_general.html#1 Logical resources include all of organisational rules and
behavior of human operators. [1]
The attacks on the physical resources are mainly aimed at
3.1 Information Security Policy removing or damaging critical assets. Some of the main types
of attack on the physical plane are the following [1]:
Effective policy is a team efford involving the participation
and support of very one in the organisation and affiliate who • Theft: disks or entire servers, is an attack on the
deals with information and information system. Users should availability and confidentiality.
take responsibility to follow guidelines and exiting • Damage: Usually these types of attack are intended to
procedures [24]. The first step towards securing your IT damage equipment and the network.
infrastructures is to decide what you are really trying to
Logic level attacks are mainly intended to interfere with
protect, and what you are trying to protect against. This
the system, steal information or degrade the performance of
should be clear from your organisation’s security policy – if
the system. In terms of results aims to achieve an attack
you do not already have a policy, this should prompt you to
against the logic level can be classified as follows: attack on
consider your priorities around [28]: confidentiality, attack on the integrity and attack on
availability. Levels commonly found in modern systems of
• Which of your information must remain confidential information are [1]:
• What integrity of information must be maintained
• What protection you need against unauthorised access • Interface (client): which implements the user interface;
• Which availability you need to ensure to your • Application server:, which implements application
information and systems services;
• Which regulatory or legal obligations you need to • Data Applications: responsible for the storage of data on
comply with, in your home jurisdiction and (potentially) mass storage and retrieval;
abroad • Hand-frames: where applicable, the interface with the
modern information system offered by one or more
3.2. Resources of a system systems of "legacy" systems is important is not cheap to
replace or modify
Protecting the security requirements of a system means: (i)
Once critical resources are identified, steps must be taken
reduce the probability of a violation; (ii) early identification
to ensure in case of adverse events, which could cause
when and where in the system this happens; and (iii) limit the
141
International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

deterioration in the characteristics of integrity, availability against those that seek to minimise the likelihood that an
and confidentiality. According to statistics, accidental events adverse event occurs;
such as the failure of one system or human error (example, • Computer or organisation: the former are based on
accidental deletion of files, the installation of incompatible computer technology and the second the organisation
components or infected, corrupting the basic software) using the system;
remains the leading cause of accidental loss of data. • A physical or logical: operation to protect against
physical devices. Attacks such as theft or physical
damage, and those who operate at the logical level, such
3.3 A Systematic Approach
as anti-virus software, protection of logic resources
logical attacks.
Management Information Security has turned out to be
difficult as organsiations may fail to have an inclusive,
systematic management approach [26]. In today’s economic, Figure 2: System Approach to Security
political, technological, and social environment, addressing
information security is a core responsibility. [25] Threfore,
managers must find solutions which sets a comprehensive
knowledge of their organization’s security posture. Because
of constraints such as a budget problem may prevent security
professionals to handle the security demands properly. [26]
They have to evaluate the security position of the
organisation to decide the effectiveness and efficiency of the
security implemented in the organization. [26]
Threats to our agency’s data and IT resources come from
within and from outside our agency. They may be manmade
or of natural causes. They may be intentional or accidental.
It seems natural to characterise an attack based on the
technique an intruder can use. Attackers have malevolent
intention and their aim is to exploit the vulnerabilities of a
system. [21] It is hard to model security features without any
description of the attackers and their threats to a system. [21]
A systematic approach can identify all system components,
both physical (computers, routers, cables) and logical (files)
then draw all possible attack techniques that are applicable
(see Figure 2). The result of this approach can be easily
summed up with components of possible attacks. A
systematic approach can make [24]:

• The security requirements of the organisation should be Source: http://www.emeraldinsight.com/fig/1570140607001.png


clearly identified and understood.
• A clear security policy and procedures should be
established and enforced A crucial aspect condition adhered to the security
• A periodic security risk assessments and audits should be procedures laid down is to effectively enforce it and make
conducted, as well as continuous monitoring of systems the staff to be fully aware of its importance. [20] Effective
to ensure that effective and efficient security policies and security is a team effort involving the participation and
procedures are properly implemented. support of every employee and affiliate who deal with
information and/or IS. It is the responsibility of every
Intruders can exploit the inherent weaknesses of some computer user to know these guidelines, and to conduct
protocols and network software, or simply imprudent their activities accordingly [24].
operating system configurations. In some versions of X- There must be clearly defined roles and responsibilities
Window graphics system, for example, one can spy on in a safe management system, and for each role, the
everything that user makes [1]. administrator must be a simple user defined rule of
To minimise the likelihood of adverse events to occur it is conduct and specific procedures. [1, 20]
necessary to use a holistic approach where it sets in place a Ensure that all procedural aspects are understood and
strong countermeasure related to technology, the growing implemented correctly, and where necessary staff made
interconnection between systems and, more importantly, the aware and be trained. [1] The introduction of safety
increasing sophistication of deliberate attacks. procedures should also be justified and made acceptable
Besides the classification criterion, we can distinguish with a broad awareness.
between countermeasures [1]:
• Corrective or preventive measures: preventive-measures
142
International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

4. Data Protection Policy 5. Conclusion

To protect data in the system is always an overwhelming


Information security is achieved by putting into practice an
task, particularly when there is the question with the budget
appropriate set of controls. This includes policies, processes,
or overloading team [29]. There are four key areas to be procedures, organizational structures and software and
considered for the construction for a holistic approach to hardware functions.[29] These controls need done in
system protection. Despite that the policy of using conjunction with other business management objectives.
individually might work, it best could be approachable all Information system security is often the subject of
together to get “an overall strategy whose whole is greater descriptions as it is often compared to a chain of a system's
than the sum of its parts” [29]. security level. It must be as strong as the security level of its
weakest link. [25] Defining a security policy is an important
a. Complying with policies: Make sure that users are prerequisite for all organisations on safety (likely scenario) to
adhering to the policies you put into place. o stay ahead of be treated as consistent. One must first make a selection of
these escalating threats, your organization needs a solution countermeasures to be taken actually.
that detects and defends against known threats—preventing An effective level of awareness is essential to an
most from getting into your system in the first place—while information security program. The security plan puts in place
also being able to effectively detect, block and remotely the ability of the system refer to existing security controls. It
clean up emerging, unknown threats. Such comprehensive also offers a comprehensive description of the information
performance will give your business the advantage it needs in system as it offers references to key documents supporting
the battle against malware and external threats. the organisation’s information security program [23] some of
b. External threats and malware: Stop users from being which, as quoted in [23] are: the configuration management
careless with data. Regulations regarding securing plan, contingency plan, incident response plan, security
confidential, personal data continue to grow more numerous awareness and training plan, rules of behavior, risk
and more stringent. Retailers and healthcare providers are assessment, security test and evaluation plan, system
now joined by virtually every other type of business that interconnection agreements, security authorisations and
handles customer information under the microscope of accreditations, and the plan of action with milestones.[23]
regulatory compliance for data security. It’s one thing to have [23]
all your policies neatly documented, but it’s an entirely As one of the main uses of IS is to share information
different thing to get people to comply. Deploying a between people, conventional operating systems typically
technology solution enables you to enforce policies and provide facilities for the exchange of information.
monitor activity across your organization. This also helps you
to prove that you are taking appropriate action to protect the
References
sensitive and confidential data on your network.
c. Preventing data loss: An organization that has
[1] Leonforte, Antonio, La Sicurezza nei Sistemi
successfully implemented a dedicated lost prevention Informativi,2009.
solution is an exception to the norm. Most businesses wrestle http://www.villaumbra.org/resources/Documenti/Region
with this issue and are unsure of the best way to attack the e/sicurezza%20S.I.pdf, accessed on 29/02/2010.
problem. For the vast majority of organizations, [2] Gray, J.W., III; , "Information sharing in secure
implementing a dedicated data lost prevention solution is like systems," Computer Security Foundations Workshop
using a sledgehammer to crack a nut. One potential III, 1990 Proceedings , vol., no., pp.128-138, 12-14,
nightmare for an organization — and its IT manager — is a Jun 1990
user who sends an email with confidential data attached and [3] Qi Shi; McDermid, J.A.; Zhang, N.; , "On analysis of
accidentally copies an unauthorized, external recipient. Once secure information systems: a case study," Computer
he or she pushes the send button, that data is off to where it Software and Applications Conference, 1994.
shouldn’t go — unless your data lost prevention solution COMPSAC 94. Proceedings., Eighteenth Annual
features a gateway that can identify that the data in question International , vol., no., pp.364-369, 9-11 Nov 1994,
shouldn’t be sent to an external recipient and stops the [4] Siponen, Mikko, Designing secure information systems
transfer before it is completed. That’s how easy it would be if and software: Critical evaluation of the existing
approaches and a new paradigm, 2007.
your anti-virus product could also manage your data lost
http://herkules.oulu.fi/isbn9514267907/html/ accessed
prevention needs.
12/01/2010.
d. Securing mobile data: Ensure that sensitive data can’t
[5] Siponen Mikko T., Secure-System Design Methods:
be compromised if users lose devices, while still allowing Evolution and Future Directions,
data to be exchanged among authorized users. Several http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumb
solutions, such as encryption, are available to protect data at er=1650155, IT Professional, IEEE, 05 July 2006, 8: 3,
rest on the network. However, when data starts moving, it is pp. 40–44, accessed on 29/03/2010.
at a much greater risk of being compromised or lost, whether [6] Siponen, M.; Pahnila, S.; Mahmood, M.A.; ,
it’s moving because someone is taking it off the network, or "Compliance with Information Security Policies: An
because it’s on the laptop of an employee who is travelling.
143
International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 1, March 2011

Empirical Investigation," Computer , vol.43, no.2, [20] Okubo, T.; Taguchi, K.; Yoshioka, N.; Misuse Cases +
pp.64-71, Feb. 2010 Assets + Security Goals, 2009. CSE '09. International
[7] Backhouse J & Dhillon G, Structures of responsibilities Conference on Computational Science and Engineering,
and security of information systems. European Journal Volume: 3, 424 – 429, 2009.
of Information Systems 5: 2-10, 1996. [21] Mustaquim, M., Security Concern Throughout System
[8] Barnes B H, Computer security research: a British Development Life Cycle,
perspective. IEEE Software 15: 30-33, 1998. http://www.groundreport.com/Media_and_Tech/Securit
[9] Parker D B, Computer security management, Prentice y-Concern-Throughout-System-Development-
Hall, Reston, USA, 1981. Lif_18/2846835, 2007, accessed on 27/03/2010.
[10] Sandhu R S, Lattice-based access controls. IEEE [22] Amer, S.H.; Humphries, J.W.; Hamilton, J.A., Jr.; ,
Computer 26: 9-19. "Survey: security in the system development life cycle,"
[11] Sandhu R S & Samarati P, Access control: principle and Information Assurance Workshop, 2005. IAW '05.
practice. IEEE Communications 32: 40-48, 1993, 1994. Proceedings from the Sixth Annual IEEE SMC , vol.,
[12] Baskerville R., The developmental duality of SIS. no., pp. 310- 316, 15-17 June 2005.
Journal of Management Systems 4: 1-12, 1992. [23] InfoSec, Acceptable Use Policy,
[13] Baskerville R, SIS design methods: implications for http://csc.colstate.edu/summers/e-library/policy.html,
information systems development. ACM Computing accessed on 10/042010.
Surveys 25: 375-414, 1993. [24] Kioskea, IT Security - Introduction to IT Security,
[14] Dhillon G, Managing SIS. MacMillan Press LTD, http://en.kioskea.net/contents/secu/secuintro.php3,
London, UK, 1997. accessed on 15/03/2010.
[15] [16] Dhillon G & Backhouse J, Current directions in IS [25] T Grobler and B Louwrens, New Information Security
security research: toward socio- organizational Architecture, University of Johannesburg,
perspectives. Information Systems Journal 11: 129-156, http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/0
2001. 46_Article.pdf , 2005, accessed on 10/04/2010.
[16] Hirschheim R, Information systems epistemology: an [26] Tudor. Information Security architecture. (2001).
historical perspective. Proceedings of the IFIP WG 8.2. Auerbach.
Working Conference on Research methods in [27] Rackspace, Securing an IT Infrastructure: A Decision
information systems. Elsevier Science Publisher, Maker’s Guide to Securing an IT Infrastructure, A
Amsterdam, 1985. Rackspace White Paper , 2010
[17] Hirschheim R, Iivari J & Klein H K, A comparison of [28] Sophos, How to protect your critical information easily,
five alternative approaches to information systems Sophos White Paper, 2006.
development. Australian Journal of Information [29] ISO/IEC 17799:2005, Information technology -
Systems 5: 3-29, 1997. Security techniques - Code of practice for information
[18] Röhm AW & Pernul G, COPS: A model and security management,
infrastructure for secure and fair electronic markets. http://www.iso.org/iso/support/faqs/faqs_widely_used_s
Proceedings of the 32nd annual Hawaii International tandards/widely_used_standards_other/information_sec
Conference on Systems Sciences, Hawaii, 1999. urity.htm, 2005, accessed on 12/04/2010.
[19] Thomson ME & von Solms R, Information security
awareness: educating our users effectively. Information
Management and Computer Security 6: 167-173, 1998.

You might also like