You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/330778559

INFORMATION SECURITY

Conference Paper · January 2019

CITATION READS

1 3,658

2 authors:

Yogesh P. Surwade Hitendra J Patil


Dr. Babasaheb Ambedkar Marathwada University Institute of Chemical Technology, Mumbai
32 PUBLICATIONS 40 CITATIONS 15 PUBLICATIONS 22 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Yogesh P. Surwade on 01 February 2019.

The user has requested enhancement of the downloaded file.


INFORMATION SECURITY
Yogesh P. Surwade* Dr. Hitendra J. Patil **

* Jr. Library Assistant,


Abstract: - With the development of the network and information
Knowledge Resource Centre,
Dr. Babasaheb Ambedkar technology, Information security has become the key of information
Marathwada University,
technology in 21st Century. Today we are living in “Information world”.
Aurangabad, Maharashtra,
India. Information is present in everywhere. Information is so important for us. If
we want to handling and doing any work we always want to up-dated
* Librarian,
SVKM's Institute of ourselves according to the current and updated information. If we are in
Pharmacy,
education world or business world or any other type of working world then
Dhule, Maharashtra,
Maharashtra, India. we all want the required information in a less wasting time and the second
thing of required information is its “Security”. It is giving an overview of
QR Code
Information security, like when we are giving or taking any information from
one place to another then we must know this that how much of required
information is secure or insecure. So first of all we have to check that the
information is not wrong and the information is totally secure.
Keywords: Information, Security, Information security, Information
protection, Information safety, CIA Triad.

Information: Information is a valuable collective ways and processes by which


asset. Information includes both in electronic and information, property and services are protected
physical forms such as paper, electronic, video, from theft, corruption or natural disaster, while
audio, voice or knowledge. allowing them to remain accessible and
Security: A number of computing productive to its intended users (Wikipedia,
researchers and practitioners have attempted to 2010).
define security in various ways. Here are some Security is “The quality or state of being
definitions that researcher thinks are generic secure that is to be free from danger.” It means to
enough to stand the test of time. Security based on be protected from adversaries from those who
computer system security perspective is a branch would do harm, intentionally or otherwise. A
of technology known as Information Security as popular organization should have the following
applied to computers and networks. It refers to the

! "#" # $ % " # # & "' ( ) *# + , *" # - ! "#". # - " #


# * / ,# *#". 01 &# 2 34
multiple layers of security in place for the important characteristics of information that
protection of its operations. determine its value to an organization:
Physical Security: To protect the physical
the scarcity of the information outside the
items, objects, or areas of an organization
organization;
from unauthorized, access and misuse.
the share ability of the information within
Personal Security: To protect the
the organization, or some part of it.
individual or group of individuals who are
authorized to access the organization and
Simplifying somewhat, these
its operations.
characteristics state that information is only
Operations Security: To protect the details
valuable if it provides advantage or utility to those
of a particular operation or series of
who have it, compared with those who don't. Thus
activities.
the value of any piece of information relates to its
Communications Security: To protect an
levels of share ability and scarcity. The aim of
organization’s communications media,
information security is to preserve the value of
technology, and content.
information by ensuring that these levels are
Network Security: To protect networking
correctly identified and preserved. Threats to
components, connections, and contents.
information influence the organization's ability to
Information Security: To protect of
share it within, or to preserve its scarcity outside.
information and its critical elements,
And threats that are carried out can cost millions
including the systems and hardware.
in compensation and reputation, and may even
jeopardize an institution's ability to survive.
What is the Information Security?
Information security means protecting History of Information Security: The
information (data) and information systems from need for computer security or to secure the
unconstitutional access, use, disclosure, physical place of hardware from outside threats,
disruption, modification, or destruction. began almost immediately after the first
Information security defends information (and the mainframes were developed. Groups developing
facilities and systems that store, use and transmit code-breaking computations during World War II
it) from a wide range of threats, in order to created the first modern computer. Symbols, keys,
preserve its value to an organization. This and facial recognition of authorized personnel
definition of information security is adapted from controlled access to sensitive military locations. In
that of the American National Security contrast, information security during these early
Telecommunications and Information Systems years was elementary and mainly composed of
Security Committee (NSTISSC). There are two simple document classification schemes. There

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 3
were no application classification jobs for created a new operating system called UNIX.
computers or operating systems at this time, While the MULTICS system had planned security
because the primary threats to security were with multiple security levels, and passwords, the
physical theft of equipment, espionage against the UNIX system did not. In the late 1970s the
products of the systems, and sabotage. microprocessor brought in a new age of
computing capabilities and security threats as
The 1960s: During the 1960s, the Department of these microprocessors were networked.
Defense’s Advanced Research Procurement
Agency (ARPA) began examining the feasibility Definition of Information Security:
of a redundant networked communications system According to Merriam-Webster Dictionary,
designed to support the military’s need to security in general is the quality or state of being
exchange information. Larry Roberts, known as secure, that is, to be free from harm. According to
the Founder of the Internet, developed the project Oxford Students Dictionary Advanced, in a more
from its inception. operational sense, security is also taken steps to
ensure the security of the country, people, things
The 1970s and 80s: During the next decade, the of value, etc. Schneier (2003) consider that
ARPANET grew in popularity and use, and so did security is about preventing adverse consequences
its potential for misuse. In December of 1973, from the intentional and unwarranted actions of
Robert M. Metcalfe, indicated that there were others. Therefore, the objective of security is to
fundamental problems with ARPANET security. build protection against the enemies of those who
Individual remote users’ sites did not have would do damage, intentional or otherwise.
sufficient controls and safeguards to protect data According to Whitman and Mattord (2005),
against unauthorized remote users. There were no information security is the protection of
safety procedures for dial-up connections to the information and its critical elements, including the
ARPANET. User identification and authorization systems and hardware that use, store and transmit
to the system were nonexistent. Phone numbers that information. Information security is the
were widely distributed and openly publicized on collection of technologies, standards, policies and
the walls of rest rooms and phone booths, giving management practices that are applied to
hackers easy access to ARPANET. Much of the information to keep it secure.
focus for research on computer security centered
on a system called MULTICS (Multiplexed The information security performs four
Information and Computing Service). In mid- important functions for an organization which is
1969, not long after the restructuring of the enables the safe operation of application
MULTICS project, several of the key players implemented on the organization’s Information

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 50
Technology (IT) systems, protect the data the
organizations collects and use, safeguards the
technology assets in use at the organization and
lastly is protect the organization’s ability to
function. The information security also enables
the safe operation of application implemented on
the organization’s Information Technology (IT)
systems. This is because to protect the data, the
organization will applied or install the appropriate
software that will secure the data such as antivirus Figure

and others protected applications. So, information Classical CIA triad of Information Security

security is very important in an organization to Confidentially:

protect the applications that implemented in


Ensures that the essential level of secrecy
organizations and protect the data store in
is enforced at each junction of data processing and
computer as well. Besides protect the data, the
prevents unauthorized disclosure. The level of
application installed also need to be protect
secrecy should prevail while data resides on
because it can contribute to information lost or
systems and devices within the network, as it is
damages.
transmitted and once it reaches its destination.
Core Information Security Principles:
Threat Sources:
The three fundamental principles of security are
availability, integrity, and confidentiality and are
• Network Monitoring
commonly referred to as CIA(Central Intelligence
• Shoulder Surfing- monitoring key
Agency) or AIC triad which also from the main
strokes or screen
objective of any security program. The level of
• Stealing password files
security required to realize these principles differs
• Social Engineering- one person posing
per company, because each has its own unique
as the actual
combination of business and security goals and
requirements. All security panels, mechanisms, Countermeasures:
and safeguards are implemented to provide one or
more of these principles. All hazards, threats, and • Encrypting data as it is stored and
vulnerabilities are measured for their potential transmitted.
capability to compromise one or all of the AIC • By using network padding.
principles. • Implementing strict access control
mechanisms and data classification.

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 51
• Training personnel on proper procedures. • Use of certain firewall and router
Integrity: Integrity of data is protected when configurations.
the assurance of accuracy and reliability of
information and system is provided, and
unauthorized modification is prevented.

Threat Source:

• Viruses
• Logic Bombs
• Backdoors

Countermeasures: Figure
Modified and more realistic CIA triad of
• Strict Access Control
Information Security
• Intrusion Detection
IMPORTANCE OF INFORMATION SECURITY:
• Hashing
Information security (InfoSec) is the exercise of
Availability: Availability ensures reliability
protecting information while still providing access
and timely access to data and resources to
to those who need it. Learn about the three ethics
authorized individuals.
that are the foundation of good InfoSec. In the era

Threat Sources: of the Internet, protecting of information has


become just as important as protecting our
• Device or software failure. property. Information security (InfoSec) is the
• Environmental issues like heat, cold, practice of protecting together physical and digital
humidity, static electricity, and information from destruction or unauthorized
contaminants can also affect system access. Every day we take phases to protect the
availability. things that are important to us. The reasons we do
• Denial-of-service (DoS) attacks. these things are simple -- we don't want people we
don't know or trust to get a hold of our valuables,
Countermeasures: and we don't want those valuables to come to any
damage. There are many things that could be
• Maintaining backups to replace the failed
measured information that we need to protect. We
system
might have individual medical or financial records
• IDS to monitor the network traffic and
that we want to keep private. We usually don't
host system activities
want one and all in the world reading emails or

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 5
social media posts that we send to our friends or for personal purposes. For example,
family. We also want to keep certain things like employees use company email for some
our Internet passwords, credit card numbers, and individual communications, and some
banking information from getting into the employees may be allotted a blackberry or
erroneous hands. Information security is not just cell phone that they use for limited
about keeping secrets. Sometimes we just have personal use. Several people may not even
records, such as family photographs and videos or have a home computer and use their
other documents that we want to have access to at company issued laptop for everything
any time and that we don't want to be demolished including running personal software, like
or erased. their tax software. On the flip side, some
employees may bring a personal laptop
• To comply with regulatory requirements into the office and try to plug it in. The
and fiduciary responsibility. employees used organization asset that
• To improve efficiency purpose to access and kept organization
information for personal purposes. The
The information security is important in
hazard of this action is, the information
the society because it can protect the confidential
may be can access by other person from
information, enables the organization function,
external organizations.
also enables the safe operation of application
• INCONSISTENT ENFORCEMENT OF
implemented on the organization’s Information
POLICIES: Many companies either haven’t
Technology system, and information is a benefit
enforced their policies in the past, or have
for an organization.
done so inconsistently depending on the
position of the employee. The sources of
CHALLENGES OF THE INFORMATION
many issues when a security function tries
SECURITY: There are some challenges in our
to crack down of violators. Many
constantly changing environment that makes it
organizations have misjudged the
difficult to adequately protect our resources.
important of implement policies and
There are blending the corporate and personal
regulation about the information security.
live, inconsistent enforcement of policies, lack of
This makes many group writes the
awareness in information security, information
information policies but does not applied it
security threats etc.
• LACK OF AWARENESS IN INFORMATION

• BLENDING THE CORPORATE AND PERSONAL SECURITY: Lacking in information security


LIVE: Free internet services have make accepting makes the employees in an
employees takes its advantages b used it organization not secure the information

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 5
properly. They are lacking in awareness on Sometimes organizations do not take
vital of information security makes the seriously about hiring staffs based on their
information is easier to being attacks. qualification. This is because there are
Basically, employees keep the organizations that appointing employees for the
information, but they do not take proper information security manager but it is doesn’t
method in secure the information. This match with his qualification or skill that he have
may put the confidential information in about information security. So, it is difficult for
risk. that staff to keep the organizations data with
proper protection. This will makes other foes
• INFORMATION SECURITY THREATS: New
easier to attacks and stole the information if the
security fears are emerging every day from
employees don’t have skill or knowledge on how
malware programs that can be
to protect the confidential data. Even though the
inadvertently installed on a user’s
information is important in organization, there are
machine, to phishing attempts that deceive
numerous challenges to protect and manages the
employees into giving up confidential
information as well. One of challenges faced in an
information, to viruses, worms, and
organization is the lack of understanding on vital
strategic identity theft attempts.
of information security. When employees is lack
Sometimes threat assaults the information
of information security knowledge in term of
in organizations is difficult to handles. It is
keeping their information, the society is easy to
because the protection programs that
being attacks by hackers or another threats that try
mounted in the computer system to protect
to stole or get the organization confidential
the data are not properly function or not
information.
good enough. Difficulties in manage of
Information Security for Libraries: Today,
information security because of do not the
library surroundings are increasingly reliant on
suitable qualification in information
computer technology. Many libraries of all sizes
security.
have dropped use of card catalogs in favor of
electronic versions– and many of the electronic
versions previously accessible only via
workstations within library buildings are now
Web-accessible. Online searching of anexcess of
databases and other information sources has
become ubiquitous for the end user, rather than
being restricted to librarians trained in online
searching. Access to broad purpose

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 5
microcomputers and software, as well as to the of Information the giving or taking information
Internet, is offered in nearly all libraries of must be so much “secure” it means the required
significant size. Although some new texts on information is “authentic” “protective” “secure”
library security address aspects of information and and “much highly appreciated”. Information
computer security security is much needed in Libraries also because
Minimally, effective information security in the libraries also because the libraries are the
libraries should include: storehouses of “Information” and if the Libraries
• Staff assigned to information security are handling the “Security” process in giving or
tasks taking any information then the “Users” can be
• Training all personnel in information effectively use the proper information then the
security issues and procedures “Uses” can be effectively use the proper
• Specific policies dealing with information information for their purposive work and its result
privacy, physical security of equipment, will be evaluated in our libraries progress and
and computer security procedures developments. Information security is an ongoing

• Physical security plans and never ending process. Information security

• Data integrity measures includes personnel security, privacy, policy and

• Levels of access to data or equipment, and computer security. Information security is crucial

monitoring for different types of access. in organization. So it is crucial and important to

These points are proposed for all types of all staff in an organization to have knowledge and

libraries–public, academic, corporate, and understanding about the importance information

special libraries and collections. They are security practice in an organization to protect the

intended for libraries of all sizes, with all types of confidential data. Information accessed without

patrons, backing models and organizational authorization is called a data breach. Data

structures. In a particular library, theasset in breaches can be intentional or unintentional.

information services, computer apparatus and References:

personnel may be greater or smaller than in 1. Aniruddha Singh, Vaish, Abhishek

another library, but the need for effective andKeserwani, Pankaj Kumar, “Information

information security exists in both. Security: Components and Techniques,


International Journal of Advanced Research in

Conclusion: As we see that today’s world Computer Science and Software Engineering,

is much dependent upon the “Information” and its Volume 4, Issue 1, January 2014, ISSN: 2277

“security” too. “Information security” is very 128X. Available online at: www.ijarcsse.com

important for everyone because if someone is


taking any type of Information the taking any type

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 53
2. Stamp, Mark (2011) Information Security: 10. http://www.staffs.ac.uk/support_depts/infoserv
Principles and Practice, Second Edition, New ices/rules_and_regulations/Infosecurimp.jsp
Jersey: John Wiley.
11. http://www.oecd.org/document/42/0,3343,en_2
3. Newsby, Gregary B., “Information Security in
649_201185_15582250_1_1_1_1,00.html
Libraries.” In Kisielnicki, Jerzy (Ed),Modern
Organizations in Virtual Communities. 12. Importance of Information Security In

Hershey, Pennsylvania: IRM Press: 134-144. Organizations Information Technology

4. Roberts, S.J. (2014) “The Necessity of Essay.html

Information Security in the Vulnerable 13. Information Security (2017) Wikipedia, the
Pharmaceutical Industry”. Journal of Free Encyclopaedia.
Information Security, 5, 147-153. http://en.wikipedia.org/wiki/Information_secur
http://dx.doi.org/10.4236/jis.2014.54014 ity
5. Sattarova Feruza Y. and Prof.Tao-hoon Kim,
“IT Security Review: Privacy, Protection,
Access Control, Assurance and System
Security”, International Journal of Multimedia
and Ubiquitous Engineering, Vol. 2, No. 2,
April, 2007
6. Shumann, Bruce A. (1999) “Library Security
and Safety Handbook”: Prevention, Policies,
and Procedures, Chicago: American Library
Association.
7. Qadir, S. and Quadri, S.M.K. (2016)
“Information Availability: An Insight into the
Most Important Attribute of Information
Security”, Journal of Information Security, 7,
185-194.

8. Confidentiality, Integrity, Availability. The


three components of the CIA Triad Stack
Exchange Security Blog.html

9. http://www.open.edu/openlearn/science-maths-
technology/computing-and-ict/introduction-
information-security/content-section-1

“Knowledge Librarian” An International Peer Reviewed Bilingual E-Journal of Library and Information Science
Special Issue, January 2019 &# 2 55

View publication stats

You might also like