top of page

INFORMATION SECURITY BASICS

Overview

The flexibility of digital information can be regarded as a great strength. As software and hardware develop, data can be created, accessed, edited, manipulated and shared with increasing ease. The corollary is that data is vulnerable to unauthorised access, alteration or manipulation, which without checks and controls:

  • Can easily go undetected

  • Undermine its authoritative nature.

To be authoritative data needs to remain authentic, reliable and useable, while retaining its integrity. These characteristics of data can be preserved through the implementation of an effective Information Security Management Systems (ISMS).

The Information Security Triad

Information Security or, more accurately, Information Assurance, is founded on three major concepts, i.e. Confidentiality, Integrity, and Availability (CIA):

  • Confidentiality ensures that data is only available to those authorised to access it.

  • Integrity ensures that data can only be altered by authorised persons.

  • Availability demands that authorised persons can access data when they require.

Managing these concepts is critical because:

  • Information is increasingly becoming one of the modern currencies of society

  • The retention of information assurance in an appropriate and cost-effective manner has become of keen interest to businesses of all sizes, in all industry sectors, and in all geographic locations.

Non Repudiation

Non-repudiation refers to a state of affairs where the author of a statement will not be able to successfully challenge the authorship of the statement or validity of an associated contract. The term is often seen in a legal setting wherein the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated".

In a general sense, non-repudiation involves associating actions or changes to a unique individual. For a secure area, for example, it may be desirable to implement a key card access system. Non-repudiation would be violated if it were not also a strictly enforced policy to:

  • Prohibit sharing of the key cards

  • Immediately report lost or stolen cards.

 

Otherwise determining who performed the action of opening the door cannot be trivially determined.

 

Similarly, for computer accounts:

  • The individual owner of the account must not allow others to use that account, especially, for instance, by giving away their account's password

  • A policy should be implemented to enforce this.

 

This prevents the owner of the account from denying actions performed by the account.

What Is Information Security (InfoSec)?

Information security, sometimes shortened to Info Sec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take, e.g. electronic/digital, paper-based, physical).


Following are examples of information security categories:

  • Internet security

  • Cyberwarfare

  • Computer security

  • Mobile security

  • Network security

Information Security Threats

Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort.

 

Following are examples of security threats to data and information:

  • Computer crime/ cybercrime

  • Vulnerability

  • Eavesdropping

  • Exploits

  • Trojans

  • Viruses and worms

  • Denial of service

  • Malware

  • Payloads

  • Rootkits

  • Keyloggers.

Responses to InfoSec Threats

Possible responses to a security threat or risk are to:

  • Reduce/mitigate by implementing safeguards and countermeasures to eliminate the vulnerabilities or block the threats

  • Assign/transfer by placing the cost of the threat onto another entity or organization, such as purchasing insurance, or outsourcing

  • Accept by evaluating if cost of countermeasure outweighs the possible cost of loss due to threat

  • Ignore/reject – this is not a valid or prudent due-care/due diligence response.

Following are examples of defences to information security threats:

  • Computer access control

  • Application security, e.g. antivirus software, secure coding, security by design, and secure operating systems

  • Authentication, e.g. multi-factor authentication

  • Authorization

  • Data-centric security

  • Firewall (computing)

  • Intrusion detection system

  • Intrusion prevention system

  • Mobile secure gateway.

What is an ISMS?

Definition: an Information Security Management System (ISMS) is a:

  • Set of policies, processes, and procedures, for systematically managing an organization's sensitive data.

  • Systematic approach to managing sensitive company information (assets) so that it remains secure.

The policies, procedures, resources (both human and IT/machine), which constitute an ISMS, should ensure that the CIA Triad (Confidentiality, Integrity and Availability) is maintained across an organisation's physical, personal and organisational layers.
 

The ISMS:

  • Is an overarching management framework, through which the organization identifies, analyses and addresses its information risks

  • Ensures that the security arrangements are fine-tuned to keep pace with changes to the security threats, vulnerabilities and business impacts - an important aspect in such a dynamic field, and a key advantage of ISO 27K’s flexible risk-driven approach.

Goal: to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach. 

Scope: an ISMS includes people, processes, data, information, and IT systems

An ISMS can:

  • Be focused on a particular type of data, such as customer data, or employee data

  • Be implemented in a comprehensive way, that becomes part of the company's culture

  • Help small, medium and large businesses, in any industry sector keep information assets secure.

​For an overview and vocabulary of ISO 27000: 2016 click here.

General Course Information

For general course information please click on the link here.

N.B. Please read our Terms & Conditions (T&Cs) and ask for clarifications, if any, before booking your training event.

Book now to reserve an on-site or online instructor-led training event of your choice.

For more details about our:

  • List of training courses please click here.

  • Consulting services please click here

  • Workshops please click here.

For queries, including non-obligation quotes, please contact us.

​​​​​

bottom of page