4
Why is information security important? The home of free learning from The Open University The home of free learning from The Open University This unit introduces you to information security and its management. A succinct definition of information security might run as follows: Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. But why is it important to secure information? And how should its security be managed? To start thinking about these questions, consider the following statements about information: In today's high technology environment, organisations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Many organisations will identify information as an area of their operation that needs to be protected as part of their system of internal control. (Nigel Turnbull, 2003, p. xi) Competitive advantage … is dependent on superior access to information. (Robert M Grant, 2000, p. 186) Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders. (Ronald Reagan, 1989)

Why is Information Security Important

Embed Size (px)

DESCRIPTION

An article of Cyber Security to recognize the significance of protect the business information.

Citation preview

  • Why is information security

    important? ThehomeoffreelearningfromTheOpenUniversityThehomeoffreelearningfromTheOpenUniversity

    Thisunitintroducesyoutoinformationsecurityanditsmanagement.

    Asuccinctdefinitionofinformationsecuritymightrunasfollows:

    Informationsecurityisthecollectionoftechnologies,standards,policiesandmanagementpracticesthatareappliedtoinformationtokeepitsecure.

    Butwhyisitimportanttosecureinformation?Andhowshoulditssecuritybemanaged?Tostartthinkingaboutthesequestions,considerthefollowingstatementsaboutinformation:

    Intoday'shightechnologyenvironment,organisationsarebecomingmoreandmoredependentontheirinformationsystems.Thepublicisincreasinglyconcernedabouttheproperuseofinformation,particularlypersonaldata.Thethreatstoinformationsystemsfromcriminalsandterroristsareincreasing.Manyorganisationswillidentifyinformationasanareaoftheiroperationthatneedstobeprotectedaspartoftheirsystemofinternalcontrol.

    (NigelTurnbull,2003,p.xi)

    Competitiveadvantageisdependentonsuperioraccesstoinformation.

    (RobertMGrant,2000,p.186)

    Informationistheoxygenofthemodernage.Itseepsthroughthewallstoppedbybarbedwire,itwaftsacrosstheelectrifiedborders.

    (RonaldReagan,1989)

    http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-information-security/content-section-3

  • Itisvitaltobeworriedaboutinformationsecuritybecausemuchofthevalueofabusinessisconcentratedinthevalueofitsinformation.Informationis,asGrantsays,thebasisofcompetitiveadvantage.Andinthenotforprofitsector,withincreasedpublicawarenessofidentitytheftandthepowerofinformation,itisalso,asTurnbullclaims,theareaofanorganisation'soperationsthatmostneedscontrol.Withoutinformation,neitherbusinessesnorthenotforprofitsectorcouldfunction.Valuingandprotectinginformationarecrucialtasksforthemodernorganisation.

    Ifinformationwereeasytovalueandprotect,however,youwouldbeabletobuyofftheshelfinformationsecuritymanagementsolutions.Therearethreecharacteristicsofinformationsecuritythatmakethisimpossible.

    1. Thecollectionofinfluencestowhicheachorganisationisexposedvarieswiththeorganisation:theinformationtechnologythatituses,itspersonnel,theareainwhichitdoesbusiness,itsphysicallocationallthesehaveaneffectoninformationsecurity.

    2. Informationsecurityaffectseverystructuralandbehaviouralaspectofanorganisation:agapinasecurityfencecanpermitinformationtobestolenavirallyinfectedcomputerconnectedtoanorganisation'snetworkcandestroyinformationacupofcoffeespiltonacomputerkeyboardcanpreventaccesstoinformation.

    3. Eachindividualthatinteractswithanorganisationinanywayfromthepotentialcustomerbrowsingthewebsite,tothemanagingdirectorfromthemalicioushacker,totheinformationsecuritymanagerwillmakehisorherownpositiveornegativecontributiontotheinformationsecurityoftheorganisation.

    Thusinformationsecurityanditsmanagementneedtobeexaminedwithinanorganisationalcontext.Tothisend,amajoraimofthisunitistogiveyoutheopportunityto:

    investigateyourorganisationanddeterminetheprecisemixofinformationsecurityissuesthataffectit

    explainthelinksbetweenareasofanorganisationandnavigateyourorganisation'sinformationsecurityweb

    identifythesecuritycontributionsofeachindividual,andsosuggeststrategiestomakethesumofthepositivecontributionsgreaterthanthesumofthenegativeones.

    Beforeyoucaninvestigateinformationsecurityanditsmanagementwithinyourorganisation,weneedtointroduceyouinmoredetailtothecomplexitiesofthetopic.Thisisthepurposeofthisunit.Section2discussesthemeaningofthetermsinformation,informationsecurityandinformationsecuritymanagement.Section3looksatinformationsecurityanditsimperativesandincentives.Section4discussesinformationassets.Section5examinestheplanningofaninformationsecuritymanagementsystem.Section6addresseshowriskstoinformationsecuritycanbeassessedandhowinformationassetscanbeidentified.

  • Section7describeshowasystemforinformationsecuritymanagementcanbeimplementedandcontinuallyimproved.Whyisinformationsecurityimportant?Thisunitintroducesyoutoinformationsecurityanditsmanagement.Asuccinctdefinitionofinformationsecuritymightrunasfollows:Informationsecurityisthecollectionoftechnologies,standards,policiesandmanagementpracticesthatareappliedtoinformationtokeepitsecure.Butwhyisitimportanttosecureinformation?Andhowshoulditssecuritybemanaged?Tostartthinkingaboutthesequestions,considerthefollowingstatementsaboutinformation:Intoday'shightechnologyenvironment,organisationsarebecomingmoreandmoredependentontheirinformationsystems.Thepublicisincreasinglyconcernedabouttheproperuseofinformation,particularlypersonaldata.Thethreatstoinformationsystemsfromcriminalsandterroristsareincreasing.Manyorganisationswillidentifyinformationasanareaoftheiroperationthatneedstobeprotectedaspartoftheirsystemofinternalcontrol.(NigelTurnbull,2003,p.xi)Competitiveadvantageisdependentonsuperioraccesstoinformation.(RobertMGrant,2000,p.186)Informationistheoxygenofthemodernage.Itseepsthroughthewallstoppedbybarbedwire,itwaftsacrosstheelectrifiedborders.(RonaldReagan,1989)Itisvitaltobeworriedaboutinformationsecuritybecausemuchofthevalueofabusinessisconcentratedinthevalueofitsinformation.Informationis,asGrantsays,thebasisofcompetitiveadvantage.Andinthenotforprofitsector,withincreasedpublicawarenessofidentitytheftandthepowerofinformation,itisalso,asTurnbullclaims,theareaofanorganisation'soperationsthatmostneedscontrol.Withoutinformation,neitherbusinessesnorthenotforprofitsectorcouldfunction.Valuingandprotectinginformationarecrucialtasksforthemodernorganisation.Ifinformationwereeasytovalueandprotect,however,youwouldbeabletobuyofftheshelfinformationsecuritymanagementsolutions.Therearethreecharacteristicsofinformationsecuritythatmakethisimpossible.Thecollectionofinfluencestowhicheachorganisationisexposedvarieswiththeorganisation:theinformationtechnologythatituses,itspersonnel,theareainwhichitdoesbusiness,itsphysicallocationallthesehaveaneffectoninformationsecurity.Informationsecurityaffectseverystructuralandbehaviouralaspectofanorganisation:agapinasecurityfencecanpermitinformationtobestolenavirallyinfectedcomputerconnectedtoanorganisation'snetworkcandestroyinformationacupofcoffeespiltonacomputerkeyboardcanpreventaccesstoinformation.Eachindividualthatinteractswithanorganisationinanywayfromthepotentialcustomerbrowsingthewebsite,tothemanagingdirectorfromthemalicioushacker,totheinformationsecuritymanagerwillmakehisorherownpositiveornegativecontributiontotheinformationsecurityoftheorganisation.Thusinformationsecurityanditsmanagementneedtobeexaminedwithinanorganisationalcontext.Tothisend,amajoraimofthisunitistogiveyoutheopportunityto:investigateyourorganisationanddeterminetheprecisemixofinformationsecurityissuesthataffectitexplainthelinksbetweenareasofanorganisationandnavigateyourorganisation'sinformationsecuritywebidentifythesecuritycontributionsofeachindividual,andsosuggeststrategiestomakethesumofthepositivecontributionsgreaterthanthesumofthenegativeones.Beforeyoucaninvestigateinformationsecurityanditsmanagementwithinyourorganisation,weneedtointroduceyouinmoredetailtothecomplexitiesofthetopic.Thisisthepurposeofthisunit.Section2discussesthemeaningofthetermsinformation,informationsecurityandinformationsecuritymanagement.Section3looksatinformationsecurityanditsimperativesandincentives.Section4discussesinformationassets.Section5examinestheplanningofaninformationsecuritymanagementsystem.Section6addresseshow

  • riskstoinformationsecuritycanbeassessedandhowinformationassetscanbeidentified.Section7describeshowasystemforinformationsecuritymanagementcanbeimplementedandcontinuallyimproved.