You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/220349069

Information Assurance and Security.

Article · January 2005


Source: DBLP

CITATION READS

1 18,706

4 authors, including:

Ajith Abraham Sugata Sanyal


Bennett University University of Louisiana at Lafayette
1,819 PUBLICATIONS 44,105 CITATIONS 137 PUBLICATIONS 2,600 CITATIONS

SEE PROFILE SEE PROFILE

Lakhmi C. Jain

911 PUBLICATIONS 10,622 CITATIONS

SEE PROFILE

All content following this page was uploaded by Sugata Sanyal on 29 May 2014.

The user has requested enhancement of the downloaded file.


i

Editorial Preface

Information Assurance
and Security
Corey D. Schou, Idaho State University, USA
Kenneth J. Trimmer, Idaho State University, USA

Welcome countermeasures to protect Critical Infor-


mation Infrastructure (CIP). It is important
Welcome to the first special edition of to remember that in an electronic era,
the Journal of Organizational and End information must be defended not only for
User Computing on Information Secu- national security but for legal reasons such
rity. Four articles form the core of this as FERPA and HIPPA2. In a recent ar-
special edition. The articles focus on items ticle, Maconachy3 points out that the end
of interest to the end user and range from user is the first line of defense.
conceptual work to empirical studies and
bridge the gap between basic information The Threat
security and the emerging discipline of
information assurance. Security holds both national and inter-
national attention; frequently, one loses site
Background that our information security is more than
physical. Global commerce relies on com-
Information assurance contains all puters and an associated electronic infra-
the elements of information security (con- structure. E-commerce, business to busi-
fidentiality) but also includes elements of ness, Internet, and e-mail are just a few of
availability, and integrity1. Information as- the tools that have entered the vocabulary
surance provides a view of information of the end user in the past decade. Many
protection that includes defensive mea- individuals would not know how to make
sures in all three states — processing, their lives work nor their enterprise profit-
storage, and transmission. To defend infor- able without these tools. Consider how
mation and data there are three fundamen- much would your life change if you no
tal countermeasure categories: longer had access to the internet and its
1. technology, myriad services?
2. operations, Now, expand your thinking to include
3. awareness, training and education. those other critical functions that are sup-
ported by that same electronic infrastruc-
Fifteen years ago, the U.S. govern- ture. Hospitals, airlines, power, food distri-
ment identified these as the three primary bution, schools, libraries, agribusiness, and
ii

manufacturing are a sample of critical in- and competition that have emerged in the
formation infrastructure components that modern economy”.4 Information assurance
support a modern economy and society. protects critical information infrastructures
These systems have become so complex and provides for homeland security5.
that no one understands all their interac-
tions. This complexity combined with Information Assurance & the
closely coupled systems operations cre-
ates fragile critical systems. In these sys- End User
tems, failure of a single component may
adversely affect the integrity, confidential- Information assurance relies on a triad
ity, and availability of many critical sys- of countermeasures; this triad is a defense
tems. In addition being fragile, they are in depth model. The most obvious and
brittle — they may break unexpectedly into expensive countermeasure is technology.
a nonrecoverable state. Any national or Technology includes everything from op-
international security effort cannot afford erating systems to routers, switches, and
to place the security of their economy and electronic intrusion detection systems. No
society on the backs of fragile systems. matter how well designed these technical
Although languages and specifics may countermeasures are, they are ineffective
differ by discipline, there is now general if they are not supported by well-designed
recognition that information technology operational plans, policies and goals. How-
security is a core business process. Inte- ever, in the final analysis, all of this fails if
gral to establishing a core process is build- one does not have end users who are
ing a competent information technology aware of information assurance issues,
security work force — a people based trained to operate systems appropriately.
countermeasure. This security workforce Like the iceberg, the majority of in-
facilitates both industry and government in formation assurance supports the small,
establishing integrated information secu- visible portion at the top and like the ice-
rity systems relying on multidimensional berg; one must worry about the parts that
approaches. The multidimensional approach are unseen.
deals with technologies such as biometrics,
cryptographic systems, and smart cards; Guidelines for Users
operations issues such as HIPAA, trans-
border data flows, procedures, software
From an end user perspective, the
property rights, privacy, auditing, person-
education awareness and training are the
nel, and risk assessment; as well as people
important countermeasures. In the U.S.,
development which goes beyond just edu-
the federal government took training the
cation and training into professional devel-
end user seriously enough to demand that
opment and recognition through certifica-
all federal employees using sensitive sys-
tion.
tems receive annual training. The Com-
In the final analysis, either our
puter Security Act (PL 100-235) also delin-
economy is directly or indirectly under
eated the responsibility for information as-
attack; this attack has been termed as
surance standards between the National
network centric warfare. “The organizing
Institute of Standards and Technology
principle of network-centric-warfare has
(NIST) and the National Security Agency
its antecedent in the dynamics of growth
(NSA). However, how does one know
iii

Figure 1: Defense in Depth Pyramid Figure 2: Information Assurance Learning


Hierarchy
Security Systems Specialists and Professionals

Education Knowledge Items


Performance Items

TECHNOLOGY Education

Training

OPERATIONS Functional Systems Specialties

POLICY Training
PRACTICE Manage Acquire Design Implement Operate Use Other

Training

Awareness

AWARENESS All Employees With Access


Awareness
TRAINING Security Awareness

EDUCATION Awareness

Literacy
All Employees
Literacy Technology Literacy

were to start building compliance and good these individuals be interoperable and work
practice? from the same knowledge base to insure
In addressing where to start the build- robust, reliable, and resilient systems.
ing process, two main standards were de- A broad effort to assist in facilitating
veloped to aid managers in determining the information in the United States was fueled
end user needs for awareness, training, and in 1997 when the President’s Commission
education countermeasures. The NIST on Critical Infrastructure Protection called
Standard 800-16 and Committee on Na- for:
tional Security Standards (CNSS)6 stan- “NIST, NSA, and the U.S. Department of
dards 4011 through 4016 detail the training Education work in collaboration with
contents. the private sector to develop programs
These standards evolved from a se- for education and training of informa-
ries of studies over more than a decade that tion assurance specialists and for the
established their content. Figure 2 shows7 continuing education as technologies
the relationships among literacy, aware- change.” 9
ness, training, and education.
The previous statements indicate a
Awareness Training & strong need for a structured model for
literacy, awareness, training, and educa-
Education: End User tion to all employees.10
Solutions
Awareness
To illustrate the need for training and
education, the healthcare environment pro- Awareness is at the lowest level of
vides an example. By implication, every the solution to information assurance. It is
healthcare worker needs to have a com- designed to affect short-term memory. It is
mon understanding that allows all individu- composed of stimulation, focus, attention,
als involved in biomedical informatics and decision, and assimilation (examples are
their associated critical information infra- presented in Table 1). A successful pro-
structure systems to work together in an gram will begin by meeting these five re-
environment of trust.8 It is essential that quirements.
iv

Table 1: Awareness Characteristics


STIMULATION FOCUS ATTENTION DECISIONS ASSIMILATION
Security only colors Change Locks Bulletin Boards Read Security Reg. Key ring with message
Security only music theme Reminders Flyers Read Magazines Short Seminars
Posters Attend Lecture Video Tape Programs

Table 2: Literacy Examples


Definitions Distinctions
Virus, Trojan horse, worm Authentication vs. passwords
Insider threat Certification vs. accreditation systems

Table 3: Training Characteristics


ACTIVE KNOWLEDGE SEEKER LONG TERM MEMORY
Self Paced Course Computer Based Instruction
OJT Multi- Session Seminar
Conferences

Literacy Education

Information assurance literacy places The distinction between training and


fundamental working knowledge and prin- education can be made by examining the
ciples into the minds and actions of a work intent and scope of the instruction. In a
force. Examples of literacy include those training environment, the employee learns
presented in Table 2. to use specific skills as part of exacting job
performance. In education, the employee
Training is encouraged to examine and evaluate not
only skills and methods of work but funda-
There is a gray zone between aware- mental operating principles and tenants
ness and training. A gross distinction be- based upon job skills. The employee is
tween them is that in awareness activities using internalized concepts and skills to
the learner is a passive recipient of mate- perform operations such as analyses, evalu-
rial, while in the training environment the ation, and judgment to reach higher cogni-
learner assumes an active role in the learn- tive level decisions. This leads to accom-
ing process. A primary role of awareness modation of newly integrated knowledge
programs is to motivate employees/learn- and skills. Accommodation is an end pro-
ers to move into a training mode and ac- cess in which the learner makes a con-
tively seek more knowledge. Examples of scious decision to modify existing ways of
strategies and goals of training efforts are thinking and responding to satisfy new
illustrated in Table 3. One fundamental experiences and knowledge. Table 4 shows
goal of training programs is motivation of examples of exercises to increase knowl-
learners to move knowledge and skills from edge integration and accommodation.
short-term memory into long-term memory.
Often, these knowledge and skills are Standards for Professionals
chained sequences of behavior that require
higher level mental processing. At the higher end, private industry
was not silent on the importance of profes-
v

Table 4: Education Characteristics


INTERNALIZATION ACCOMMODATION
Point Papers Long Term Training
Study Groups Research and Deliver Briefing

sional standards as a countermeasure. Information Assurance &


Recognizing this as a critical issue, the Joint
Academia
Security Commission on Redefining Secu-
rity pointed out in a 1994 report that …
Uniformity in skills and knowledge Information assurance was identified
taught to security professionals is needed as a national priority in the United States for
not only to ensure the quality of work, the protection of the critical information
but also to foster a common understand- infrastructure. Even before PDD-63 was
ing and implementation of security poli- established, the National Infrastructure
cies and procedures.11 Assurance Council was drawn from pri-
vate sector leaders and state/local officials
A non profit organization the Interna- to provide guidance to the policy formula-
tional Information Systems Security Certi- tion of a National Plan13, as the federal
fying Consortium12 [(ISC)2] established 10 government was proactively addressing
domains of knowledge every information the problem. The US government estab-
assurance professional should master. lished the NIETP14 to, among other func-
These 10 domains for certified profession- tions; create Centers of Academic Excel-
als (CISSP) are: lence in Information Assurance Training
• Access Control Systems & Method- and Education. This created an academic
ology infrastructure to support the critical infor-
• Applications & Systems Development mation infrastructure. Establishing NIETP
• Business Continuity Planning demonstrates the insight of government
• Cryptography leaders in information assurance. In the
• Law, Investigation & Ethics United States, the federal government es-
• Operations Security tablished an ROTC (Reserve Officers
• Physical Security Training Corps) type scholarship program
• Security Architecture & Models to increase the size of the information
• Security Management Practices assurance workforce. These Scholarships
• Telecommunications, Network & for Service (SFS)15 provide full tuition and
Internet Security stipends to support both undergraduate and
graduate studies in information assurance
They believe that all professionals at centers of excellence schools. Upon
need to understand all aspects of these ten graduation, the student is required to work
learning domains. They believe that end for the federal government for two years.
users should be at least aware of these Such programs are necessary in order to
subjects. create a pool of professionals, educated in
standard practices to help insure organiza-
tional information assurance.
vi

This Special Edition Closing

The selection of articles for this first If the reader is being introduced to
special edition covers many of the critical information assurance issues, we hope that
issues of end user computing from both the you find this set of research manuscripts
industrial and academic standpoint. informative. For the reader experienced in
The special edition begins with a con- IA issues, our hope is that you find the
ceptual and definitional work by Gupta, conceptual and empirical studies presented
Rao, and Upadhyaya, a discussion of a here to be stimulating to your research,
broad range of security and assurance practice, and teaching.
issues with a focus on electronic banking.
This paper provides the Information Pro- Endnotes
fessional with little background in IA an
introduction to its terminology and prin- 1
Integrity is the quality of an informa-
ciples, as well as a specific topics focusing
tion system reflecting logical correctness,
on banking issues.
reliability, and the consistency of the data
The next research paper is an empiri-
structures and occurrence of the stored
cal work by Aytes and Connolly that pro-
data. Confidentiality is the assurance that
vides a perspective on potential security
information is not disclosed to unauthorized
concerns for organizations. This research
persons, processes, or devices. Availability
focuses on the security behaviors of a
is the timely, reliable access to data and
population of undergraduate IT majors.
information services for authorized users.
The researchers discuss perceived risk 2
Family Educational Rights and Pri-
and the security precautions emphasized
vacy Act and Health Insurance Portability
by these future organizational employees.
And Accountability Act
Warkentin, Davis, and Bekkering 3
V. Maconachy, C. Schou, D. Welch,
present a strategy to provide system users
& D. J. Ragsdale (2001). “A Model for
with robust password security. Their em-
Information Assurance: An Integrated Ap-
pirical study on preferences for competing
proach.” Proceedings of the 2nd Annual
password strategies presents a new pass-
IEEE Systems, Man, and Cybernetics In-
word generation strategy. As with the pre-
formation Assurance Workshop, West
vious paper, their work also utilizes an
Point, NY (June 5-6, pp. 306-310).
important future pool for information as- 4
A.K. Cebrowski & J.J. Garstka
surance, students.
(1988, January). Network-Centric War-
In the final paper of the edition, Stahl
fare: Its origin and Future. Naval Institute
conceptually discusses individual responsi-
Proceedings.
bility, information assurance, and security. 5
C.D. Schou & J. Frost (2004). Home-
His manuscript develops the argument that
land Security and Information Assurance
individuals have limitations in being totally
in Biomedical Informatics Systems. IEEE
responsibility for their information assur-
Engineering in Medicine and Biology, (Janu-
ance activities and that the organization
ary/February).
needs to be aware of such limitations. 6
http://www.nstissc.gov/html/
library.html
vii

7 10
Based on a figure in C. Schou, W. V. C. Schou, W. V. Maconachy, & J.
Maconachy, et al. (1993). “Organizational Frost (1993). “Organizational Information
Information Security: Awareness, Train- Security: Awareness, Training and Educa-
ing, and Education to Maintain System tion to Maintain System Integrity.” Pro-
Integrity”. Proceedings of the 9th Interna- ceedings Ninth International Computer
tional Computer Security Symposium, Security Symposium, Toronto, Canada,
Toronto, Canada, IFIP. May.
8 11
C. Schou (2003). Standards, Stan- Redefining Security: Joint Security
dards, Standards, Who has the Standards. Commission Report, Feb. 28, 1994, p.124
12
Proceedings 4th Australian Information http://www.isc2.org
13
Warfare and IT Security Conference– En- http://www.usdoj.gov/criminal/
hancing Trust, (November 20-21). Univer- cybercrime/factsh.htm
14
sity of South Australia, Adelaide, Austra- http://www.nsa.gov/ia/academia/
lia. acade00001.cfm
9 15
Critical Foundations: Protecting http://www.ehr.nsf.gov/due/pro-
America’s Infrastructures. The report of grams/sfs/
the President’s commission on Critical In-
frastructure Protection. Oct. 1997. P71.

Corey D. Schou is the university professor of Informatics, professor of Information Systems, and
associate dean of the College of Business at Idaho State University (USA). He has been involved
in establishing computer security and information assurance training and standards for 25 years.
His research interests include information assurance, ethics, privacy, and collaborative decision-
making. Through his research, he was responsible for compiling and editing computer security
standards and training materials for the Committee on National Security Systems (CNSS). Dr.
Schou serves as the chair of the Colloquium for Information Systems Security Education (CISSE).
Under his leadership, the Colloquium creates an environment for exchange and dialogue among
leaders in government, industry, and academia concerning information security and information
assurance education. In addition, he serves as the editor of Information Systems Security and is
on the board of several professional organizations. He has served as the principal investigator
on 40 funded research projects and is currently principal investigator on the NSF Scholarship for
Service program in information assurance.

Ken Trimmer is an assistant professor of Computer Information Systems in the College of Business
at Idaho State University (USA). He has a PhD in Management Information Systems from the
University of South Florida where his dissertation focused on conflict on cross-functional teams
involved in information systems development. In addition to his research interests in systems
development, Dr. Trimmer has interests and publications in the management of systems in the
healthcare environment, educational issues in information systems coursework, and information
systems issues in small to medium organizations, which includes software development as well as
the utilization of systems. Dr. Trimmer also has interests in the teaching of information assurance,
and security issues in healthcare organizations, particularly with HIPAA.

View publication stats

You might also like