Chapter 1: Introduction CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION: Information security has always been a major challenge to most IT companies. To ensure business continuity, the security of corporate information is extremely important. The basic reason is information is an asset which, like other important business assets, is of value to an organization and consequently needs to be suitably protected. Information security protects information from a wide range of threats in order to get strategic advantage to ensure business continuity, minimize business losses and maximize return on investments and business opportunities. Previous studies have shown that corporate information is vulnerable to security attacks. This research study intends to investigate the implementation of information security policies (ISP) by IT companies based on different domains, in order to protect assets of the organization and to minimize business losses. The domains are the areas of concentration where security needs to be focused and different information security policies are developed for the domains. 1.2 INFORMATION: Information is a processed data, which is converted to specific form that gives some definite meaning. It is collection of facts organized in such a way that it has additional value beyond the facts. Information can be properly stored in organized form, for set of data which generates specific meaning. Information itself possesses many characteristics such as accuracy, portability, comprehensiveness, pertinence, currency, valuably, timely availability, meaningfulness and so on. The value of information comes from the characteristics it possesses. When characteristic of information changes, the value of that information either increases or more commonly decreases. The value of information affects more to the users than the others do. Timeliness of information is a critical factor because it loses its value after validity period is over or A Study of Information Security Policies Page 1 Chapter 1: Introduction delivered late. Though information security professionals and end –users share the same understanding of characteristics of information, tensions can arise when the need to secure integrity of information from threats conflict with the end-user‟s need for unhindered access to the information. We live in an Information economy. Information itself has value and commerce often involves the exchange of information rather than the tangible goods. Systems based on computers are increasingly used to create, store and transfer information. Information can be available in many different forms. It can be existed in printed or written on paper format, stored electronically, transmitted by post or using electronic means, shown on films, or spoken in conversation. Whatever forms the information takes, whatever the means by which it is shared or stored, it should always be appropriately protected. As Information can take many forms, hence methods of securing information are various. 1.3 INFORMATION SECURITY: Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Information security as defined by standards published by the committee on National Security System is the protection of information and its critical elements, including the systems and hardware that use, store and transmit that information. Information security is achieved by implementing a suitable set of controls which could be policies, practices, procedures, organizational structures and software functions. These controls need to be established in order to ensure that the specific security objectives of the organizations are met. 1.3.1 Control: It is a system that prevents, detects or corrects unlawful events. System is a set of interrelated components that functions together to achieve the objectives. An unlawful event can arise if unauthorized, inaccurate, incomplete, redundant, ineffective or inefficient input enters the system. For an organization Controls are broadly classified A Study of Information Security Policies Page 2 Chapter 1: Introduction into three types such as Managerial control, operational control and technical control. [1] 1.3.2 Managerial controls: This controls cover security processes that are designed by strategic planner and implemented by the security administration of organization. Management control addresses the design and implementation of the security planning process and security program management. Management controls also address risk management and security control reviews and it further describe the necessity and scope of legal compliances and maintenance of entire security life cycle. 1.3.3 Operational controls: These controls are concerned with the operational functionality of security in the organization. It includes lower level planning such as disaster recovery and incident response planning. It also includes personal and physical security as well as protection of production input and output. It provides guidance for development of education, training and awareness programs for users, administrators and management. In addition to this, it also addresses hardware and software system maintenance and integrity of data. 1.3.4 Technical controls: Technical control addresses the tactical and technical issues related to designing and implementing security in the organization. They also handle the issues related to examining and selecting the technologies appropriate to protecting information. Technical controls addresses specific technology selection and acquisition of certain technical components. Logical access controls such as identification, authorization, authentication and accountability are part of these technical controls. Technical controls also address the development and implementation of audit trails for accountability. Cryptography for message encryption and decryption also deals with technical controls. Rights assigned to the users based on his or her profile is also included in technical controls. These three sets of controls cover entire spectrum of safeguard for IT organizations. A Study of Information Security Policies Page 3 Chapter 1: Introduction OS Security and Application Controls Operational Controls DATA BASE Organizational controls Management controls Legal and societal environment Controls in IT Environment Figure 1.1: Controls in IT Environment 1.4: HISTORY OF INFORMATION SECURITY: The history of information security begins with the history of computer security. The need for security is to secure physical locations, hardware and software from outside threats. This began in the World War II when the first mainframes developed to aid computations for code breaking. History of information security is discussed below as per Information Security Era. [2] 1.4.1: Information Security Era [1960-1970]: In 1967, Department of Defense, United States, brought to the attention of researchers about the security related to sharing of resources within the department. At that time, systems were being acquired at a rapid rate and the problem of securing them was a pressing concern for both the military and defense contractors. The movement towards security that went beyond protecting physical locations began with a single paper sponsored by the Department of Defense, the Rand Report R-609, which attempted to define the multiple controls and mechanism necessary for the protection of a multilevel computer system. The document was classified for almost A Study of Information Security Policies Page 4 Chapter 1: Introduction ten years and is now referred to as ``the paper that started the study of computer security``. In mid of 1969, after restructuring of Multiplexed Information and Computing Service (MULTICS) projects, MULTICS created and implemented security levels and passwords. Its primary purpose, text processing did not require the same level of security as that of its predecessor. In fact, it was not until the early 1970s that even the simplest component of security, the password function, was implemented as a component of operating system. 1.4.2: Information Security Era [1970-1980]: In the late 1970s, the microprocessors brought in a new age of computing. The personal computer, built with this computer technology became the workhorse of modern computing, thereby decentralizing the exclusive domain of data centre. With this decentralization of data, the need for resource-sharing increased during 1980s, driving owners of personal computers to interconnect their machines. This networking ability worked for both mainframe and microcomputers and open the opportunity for computing community to make all computing resources work together. 1.4.3: Information Security Era [1980-1990]: This networking resource was made available to the general public in the 1990s, having previously been the domain of Government, academia and Industry professionals. In 1990s, network computers became more common as it increased the need to connect these networks to each other. This gave rise to the Internet, the first Global network at the close of twentieth century. After the Internet was commercialized, the technology became pervasive, reaching every corner of globe with expanding universe of uses. 1.4.4: Information Security Era [1990-2000]: At the beginning when Internet started expanding, the interconnections of millions of networks were based on de facto standards, because industry standards for interconnection of networks did not exist at that time. These de facto standards did not consider the security of information to be a critical factor, but as these precursor technologies were more widely adopted and became industry standards, some degree A Study of Information Security Policies Page 5 Chapter 1: Introduction of security was introduced. However early Internet deployment treated security as a low priority. This is the reason why today also we are facing the problems with Internet security. For example, many of the problems that plague e-mail on the Internet today are the result of this early lack of security. Early computing approaches relied on security that was built on the physical environment of the data centre that housed the computers. As network computers became the dominant style of computing, the ability to physically secure a networked computer was lost and the stored information became more exposed to security threats. 1.4.5: Information Security Era [2000-Onwards]: Today, the Internet has brought millions of unsecured computer networks into communication with each other. The security of each computer`s stored information is now contingent on the level of security of every other computer to which it is connected. 1.5. EVOLUTION OF INFORMATION SECURITY: Information security evolved from a concept developed by computer security industry known as C.I.A. Triangle. The C.I.A. Triangle has been the industry standard for computer security since the development of mainframe. [3] This C.I.A. Triangle is shown below. Information security comprises of following three basic characteristics which are discussed below: a) Confidentiality: Confidentiality means keeping information safe from being seen (privacy). It refers to how data is being collected, used and maintained within an organization. It includes the protection of data from passive attacks and requires that the information is accessible to authorized users only. It ensures that information can only be accessed by those with the proper authorization. b) Integrity: In information security, integrity means keeping information from being changed in an unauthorized way. It ensures that data is a proper representation of information, accurate, and in an unimpaired condition. Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when a computer virus infects a computer, when an employee is able to modify his own salary in a payroll database, when an unauthorized user vandalizes a web site, when A Study of Information Security Policies Page 6 Chapter 1: Introduction someone is able to cast a very large number of votes in an online poll, and so on. In short, integrity deals with safeguarding the accuracy and completeness of information and the ways in which it is processed. c) Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks. Availability ensures that authorized users have access to information and associated assets whenever required. Figure 1.2 CIA Triangle Source: ISO 17799 1.6 COMPONENTS OF INFORMATION SECURITY: Information is a process through a specific type of Information system. These Information Systems are decomposed in three main portions such as hardware, software and communications with the purpose to identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: Physical, Personal and Organizational. [4] 1.6.1 Physical level is concerned with – Physical access to system, servers, PCs, data centers, etc, holding sensitive information is restricted to business need-to-know. A Study of Information Security Policies Page 7 Chapter 1: Introduction 1.6.2. Personal level deals with user authorization. It depends on profile and rights assign to the individual user in order to access confidential information. 1.6.3. Organizational level is focused on guidelines and procedures needed to access specific information by the internal and external users of organization. These guidelines and related procedures are nothing but information security policies. The diagram given below depicts Organizational, Personal and Physical level security to maintain confidentiality, Integrity and availability of Information. Information security involves multiple portions such as hardware, software and communication as a components information system within a security firm. In this field, it is essential to integrate multiple initiatives within a corporate strategy so that each element provides an optimal level of protection. This is where information security management systems come into play – they ensure that all efforts are coordinated in order to achieve optimum security. Figure1. 3: Components of Information Security Source: WIKIPEDIA 1.7. INFORMATION SECURITY MANAGEMENT SYSTEM: An Information Security Management System (ISMS) provides a systematic approach to managing sensitive information in order to protect it. It encompasses employees, processes and information systems. An Information Security Management System (ISMS) is a management system based on a systematic business risk approach. It is a system designed to establish, implement, operate, monitor, review, maintain, and improve information security. It is A Study of Information Security Policies Page 8 Chapter 1: Introduction an organizational approach to information security.[5] It is a documented system certifying that: Information assets in an organization are described and secured, Information security risks are managed and mitigated, Security policies together with their ownerships and guarantees are in place, Adherence to security measures is inspected periodically. ISMS can be implemented as a specific information system that deals with a particular business area, or it can be implemented as an all-encompassing system involving the whole organization. In any case, ISMS usually involves resources spanning from the management to the regular employees. Figure 1.4: Components of ISMS The establishment of an Information security policy and the definition of the ISMS scope are more often management and strategic issues while the Risk Management process is an everyday operational concern. 1.7.1 The conceptual framework of ISMS: The Information Security Management System (ISO 27001: 2005) is defined as that part of a global management system, based on a certain approach of the business risk, through which it is establishing, implementing, analyzing, monitoring and improving the security of the information. This system includes organizational structures, policies, planning activities, practices, processes and resources. Information security should be an integral part of the organization‟s operating and business culture. The A Study of Information Security Policies Page 9 Chapter 1: Introduction methodological view of developing ISMS necessitates the covering of 6 steps is given below: a. Definition of Security Policy, b. Definition of ISMS Scope, c. Risk Assessment (as part of Risk Management), d. Risk Management, e. Selection of Appropriate Controls f. Statement of Applicability Although the ISMS is a recurring process as a whole, in most of the types of organizations, steps 1 and 2 recur on a longer cycle than steps 3, 4, 5 and 6. This is mainly because the establishment of a security policy and the definition of the ISMS scope are more often management and strategic issues while the Risk Management process is an everyday operational concern. Figure 1.5: The steps of the process of developing the ISMS Source: (Source: http://www.enisa.europa.eu) A Study of Information Security Policies Page 10 Chapter 1: Introduction 1.8: INFORMATION SECURITY POLICY: Information security policy is a preventative mechanism for protecting important data and processes. It is a preventive mechanism that protects information resources such as data, skilled people, hardware and software, which is considered to be the asset for the organization. It communicates coherent security standards to users, management and technical staff. It is a high-level, organization-wide plan for protecting information. Information security is primarily a management problem, not a technical one, as policy obliges personnel to function in a manner that adds to the security of information assets, rather than as a threat to those assets. A policy is a plan or course of action used by an organization to convey instructions from senior-most management to those who make decisions, take actions and perform other duties on behalf of the organization. Policies are organizational laws in that it dictate acceptable and unacceptable behavior within context of organization`s culture. 1.8.1 Policy definitions: A policy is a high-level statement of enterprise beliefs, goals and objectives and the general means for their attainment for a specified subject area. There are three different forms of policy statements. Those are: General Program Policy, Topic specific policy and System/Application-Specific policy. [6] The general program policy sets strategic directions of the enterprise for global behavior and assigns resources for its implementation. This includes the topics such as information management, conflict of interest, employee standards of conduct and general security measures. Topic specific policy addresses specific issues of concern to the organization. This includes e-mail policy, Internet usage policy, physical access policy, system application development and maintenance and network security policy. System/ Application specific policies focus on decisions taken by management to protect a particular application or system. System /Application specific policy might include controls established for specific systems such as financial management system, accounting system, employee appraisal and order inventory. Basic requirements of the policies are as follows: 1. Policies must: Be implementable and enforceable. A Study of Information Security Policies Page 11 Chapter 1: Introduction Be concise and easy to understand. Balance protection with productivity. Be updated regularly to reflect the evolution of the organization. 2. Policies should: Have rationale (reasons why policy is formulated). Describe what is covered by the policies - whom, what, and where Discuss how violations will be handled. 1.8.2. Security policy: Security policy is defined as a high level statement of organizational beliefs, goals and objectives and the general means for their attainment as related to the protection of organizational assets. A security policy is set at high level and never states `how` to accomplish the objectives. As security policy is written at high level, organizations must develop standards, guidelines and procedures that offer those affected by the policy and meeting the business objectives or missions of the organization. Security policy life cycle consists of four phases such as: a. Secure b. Monitor c. Test d. Improve. This security life cycle is shown below: Figure 1.6: Security Cycle Source: CSI Bangalore A Study of Information Security Policies Page 12 Chapter 1: Introduction a. Secure: This is a statement of policy that defines security feature or security measure for a specific domain. Policy statement is of management intention, supporting the goals and principles of information security. b. Monitor: This phase relates with supervision over implementation of policy. All related processes of a policy are observed and watched carefully. c. Test: After implementation of a policy, it is checked at various levels rigorously which can involve procedures for communications, technical tools, audits and review processes. d. Improve: This is the last phase of security cycle where feedback is taken from all concern people to find out loop-holes and discrepancies in the policy. With this policy is further updated with some modification in existing policy. This improvement in the last phase is taken care by the first phase where policy statement is modified. 1.8.3 Types of Security Policies: Security policies are classified into two broad categories: 1. Administrative Policies 2. Technical Policies 1.8.3.1 Administrative Policies: These policies are related to the people who actually implement the systems. All concerned people who are involved in design, development, implementation and support function play major role in handling administrative policies. These policies are developed for all respected domains of the organization which forms organization system. Now the question comes who should be concerned about administrative policies? Following is detailed description of users who are concern about administrative policies. a. Users - policies will affect them the most. b. System personnel - they will be required to implement and support the policies. c. Managers – are concerned about protection of data and the associated cost of the policy. A Study of Information Security Policies Page 13 Chapter 1: Introduction d. Lawyers and auditors - are concerned about company reputation, responsibility to clients/customers. 1.8.3.2 Technical Policies: These policies are concerned with all technical aspects such as hardware, software and operating system level functioning of the company. For example, it involves system fault tolerance RAID Levels, Backup media devices, up and down time for server, mean time between failures, transaction tracking systems and many more. People who are part of security-organization-structure plays major role in implementing these policies. Researcher`s emphasis is more on administrative policies than technical one, as administrative policies deals with the employees of the origination. Furthermore for the study of Information security policies, most of the times, technical aspects are not shared with outside people as a part of security measure. 1.8.3.2 A Structure/ framework of Comprehensive security policy: Without security policies, organization has no general security framework. A Comprehensive security policy consists of following structure: Policy Statements, Procedures to implement policy, Procedures to ensure compliance, Mechanism for review (audit) and updating of Policy. 1.8.4 Information Security Policy Structure: [7] Objective: Company management must establish a clear direction and support for an enterprise wide information security program. Policy Statement: Information is a company asset and is the property of the company. The company information includes information that is electronically generated, typed, stored or communicated. Information must be protected according to its sensitivity, criticality and value regardless of media on which it is stored, the manual or automated systems that process it or the method by which it is distributed. Provision: To ensure that business objectives and customer confidence are maintained, all employees have responsibility to protect information from A Study of Information Security Policies Page 14 Chapter 1: Introduction authorized access, modification, disclosure or destruction whether accidental or intentional. Responsibilities: Senior management and the officers of the company are required to employ internal controls designed to safeguard company assets, including business information. It is a management obligation to ensure that all employees understand and comply with the Company Security policies and standards as well as all applicable laws and regulations. Employee responsibilities for protecting the company information are detailed in the information classification policy. Compliance: Company management has the responsibility to manage corporate information, personnel and physical property relevant to business operations as well as the right to monitor the actual utilization of all corporate assets. Employees who fail to comply with the policies will be considered to be in violation of the company employee standards of conduct and will be subject to appropriate corrective action. 1.9 INFORMATION SECURITY POLICY STANDARDS: 1.9.1. Standards: These are mandatory activities, actions, rules or regulations designed to provide policies with support structure and specific direction they required to be meaningful and effective. They are often expensive to administer and therefore should be used judiciously. When it comes to implementing codes of practice for information security management, the best point of reference is BS 7799 / ISO 17799, an internationally recognized standard in this field that is widely used for drafting security policies. 1.9.2 BS 7799/ ISO 17799: The goal of BS 7799 / ISO 17799 is to “provide a common base for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings.” A Study of Information Security Policies Page 15 Chapter 1: Introduction 1.10 DOMAINS OF INFORMATION SECURITY POLICY: Information security policies are classified and developed for following different domains as per BS7799/ ISO 17799 standards. A Security policy needs to be based on the current organization structure and use of technology – Current and Future. Accordingly the policy can be divided into different sections. A suggested list of domains is as follows: 1. User (Personal) Policy/ Accepted Usage policy. 2. Data access Policy. 3. Physical Access Policy. 4. Internet Access Policy. 5. E-Mail Policy. 6. Digital Signature Policy. 7. Outsourcing Policy. 8. Software Development and acquisition Policy. 9. Hardware acquisition Policy. 10. Network and Telecommunication Security Policy. 11. Business Continuity Planning and Disaster Recovery Planning (BCP and DRP) 12. Policy for Security Organization Structure. Polices under this domain include the purpose and objective of the Security policy document. It specifies the policy implementation method and overall structure of Security policies. The common objectives for all the domains is about the change in IT plan with the policy, risk associated and policy based training imparted to users related to respective domains. Policies are living documents that must be managed and nurtured as they constantly change and grow. It is expected from the IT companies that these policy documents must be properly distributed, read, understood, agreed and managed. A sample representation of domains of security policy is shown on the next page. A Study of Information Security Policies Page 16 Chapter 1: Introduction Internet Access Policy Personnel Policy Data Access Policy E-Mail Policy Security Organization Structure Physical Security Policy Software Development & Maintenance Outsourcing Policy BCP DRP Hardware Acquisition Network & Telecom Digital Signatures & Encryption Figure 1.7: A Sample Representation of Domains of Security policy Source: CSI Bangalore 1.10.1: User policy (Personal Policy)/ Acceptable Usage Policy: Policy design for USER DOMAIN takes care about every individual user access to the system. This section contains the policy regarding defining and implementing logical access controls, password selection and maintenance, Classification of users based on user profiles and user groups etc. 1.10.2: Data access Policy: Data access policy is one of the most important domains where rights and permissions are set for accessing the information based on user profile. Sharing of resources, virus protection software, mandatory use of license software, password protection are the issues associated with this policy. 1.10.3: Physical access Policy: The implementation of physical access security requires sound organizational policy. Physical access policy direct the users of information assets in the appropriate use of computing resources and information assets, as well as the protection of their own personal safety in day-to-day operations. A Study of Information Security Policies Page 17 Chapter 1: Introduction 1.10.4: Internet access policy: Internet is one of the biggest aspects of the security as all the access to organizational resources is open with the support of Internet and prone to vulnerable attacks. This section covers the policies regarding Internet use and web site controls, as well as restricted use of Internet, and availability of firewall on the organizational network. This also takes care of security measures like access to specific sites and installation of proxy server and VPN for private and confidential access. 1.10.5: E-mail Access policy: Though the modern technology is an inherently risky technology but on the other hand it is also a very productive and efficient technology. Like with e-mail its value increases with the number of regular users. E-mail policy addresses the issues related to organizational e-mail accounts, restricted disk usage quota, access only to organizational e-mail server and conducting audit of e-mail utility. 1.10.6: Software Development and Acquisition policy: All policies required for development of application software in-house and purchase of new software are included in this section. It should particularly specify the development methodology, standards adopted by the organization and Project management methods. This policy ensures about the parameters such as time frame, performance ratings, steering committee and comparative analysis of vendors. 1.10.7: Hardware Acquisition policy: Policies regarding method and process to acquire the hardware and required installation software, except application software and system software like Operating system and utilities. This policy covers performance analysis of vendors, comparative analysis and rating and also time frame for installation of hardware devices. 1.10.8: Outsourcing Policy: This indicates the methods to outsource the organizations‟ information requirements. It also covers the processes regarding purchase of customized software and A Study of Information Security Policies Page 18 Chapter 1: Introduction outsourcing of information processing subsystems. It also includes non discloser agreement with the outsourcing parties and formalities for signing contract with outsourcing people. Training within the company for specific technology could be again part of outsourcing policy. 1.10.9: Digital signature Policy: Encryption of data is commonplace method. There are various encryption methods and software available in market. Therefore it is necessary to adopt a common policy for encryption. This policy mainly addresses the issues regarding assigning keys to different electronic documents with respective key algorithms, highly controlled online databases and end to end encryption methods. 1.10.10: Network and Telecommunication Security Policy: Policies in respect of Use of Network, type and configuration of network – Intranet, Extranet, and transmission speed, firewall; types of telecommunication used within the organization are covered in this section. Use of security devices like firewall and proxy server as well as backup domain controller have been considered for company information security. Applications of different RAID levels are also identified. 1.10.11: BCP and DRP: The detailed Business continuity and Disaster recovery plan for every unit of organization is necessary. This section covers the primary policy for development of BCP and DRP. It includes backup process, media storage for backup and frequency of backup and related training for DRP.. 1.10.12: Policy for Security Organization Structure: This policy takes care of information about security team and organization structure to represent degree of security from top to bottom level of the organization. It also involves the responsibility of security team in terms of IS audit with emphasis on internal and external audit. A Study of Information Security Policies Page 19 Chapter 1: Introduction 1.11 NEED OF THE STUDY: Information Technology (IT) is being managed today in leading edge enterprises, corporate, and Government sectors to improve organizations performance. Information itself has value and commerce often involves the exchange of information rather than the tangible goods. Systems based on computers are increasingly used to create, store and transfer information. Computers and information systems are constantly changing as the way organization conducts business. In this era of IT most of business organization performs online transactions and deliver value to its customers. Any business or government agency that functions within the modern context of connected and responsive services relies on information systems to support these transactions. Even if the transaction is not online information system and the data they process enable the creation and movement of goods and services. Therefore protecting data during transition and stored at one location are both critical aspects of information security. The value of data motivates attackers to steal, sabotage or corrupt it. An effective security management program is essential for protection of integrity and value of organizational information. Organizations spend hundreds of thousands of dollars and expend thousands of manhours to maintain their information systems. Unlike any other aspect of information technology, information security`s primary mission is to ensure that systems and their contents remains same. Attacks on information systems are occurring daily and the need for information security increases as the sophistication of such attacks increase. The Confederation of Indian Industry (CII) took up this critical issue and organized the IT Security Conference 2005 at Mumbai when it released a report on the „Information Security Program‟ based on research conducted across 70 sectors of Indian industry. According to the report, financial data is accorded top priority by 62 percent of the respondents when it comes to IT security. On the recent IT security breaches at BPOs in Pune, Dr.Natarajan said, “Though information security measures employed by Indian companies are at par with the best in the world, incidents such as these can occur anywhere.” He also insisted that the existence of a continuous security program is a necessity today. Statistics from the study highlight that 38 percent of A Study of Information Security Policies Page 20 Chapter 1: Introduction companies lack an information security policy, 71 percent have no security process certification, and 30 to 35 percent have no business continuity or disaster recovery plan in place. 1.11.1. Industry wise Degree of Risk to Information systems: Risk is any event that could impact a business and prevent it from reaching its corporate goals. Risk is often described by Mathematical formula [8]: Risk = Threat X Vulnerability X Asset value Threat is likelihood that the corporate will exposed to an incident that has impact on the business. Vulnerability is the point of weakness that a threat can exploit and an asset is the component that will be affected by a risk. Following figure shows the analysis for degree of exposure to risk according to industry sector specifically for information systems. Figure 1.8: Degree of Risk to Information systems Source: www.callio.com The greater the risk to an organization, the more likely the organization is to pay greater attention to the security of its data. Such is the case in governmental, financial and health-related fields, as shown in above figure. A Study of Information Security Policies Page 21 Chapter 1: Introduction An organization purchases the IP (Intellectual Property) of other organizations and abides by the licensing agreement for its fair and responsible use. The most common IP breach is the unlawful use or duplication of software-based intellectual property which is known as software piracy. Software is licensed to a single designated user of organization. Software License is based on per user access and if this license copy is copied for multiple users then this results in violation of the copyright. Software publishers use several control mechanisms to prevent copyright infringement. Still BSA survey in July 2004 revealed that as much as a third of all software in use globally is pirated. Forces of nature makes very high impact on IT companies which relates with Business continuity planning (BCP) and disaster recovery planning (DRP). These are the most dangerous threats as it usually occurs without prior intimation. These threats include events such as fire, flood, earthquake, lightning, volcanic eruption and insect infestation which can disrupt not only lives of individuals but storage, transmission and use of information. 1.11.2: Threats to Information Security: In context of information security, a threat is an object, person or other entity that represents a constant danger to an asset of organization. These threats can be classified as Internal and External threats. Internal threats are usually associated with employees of organization who are involved in the business processes and external threats occur due to external environment such as competitors in the market. Act of human error or failure, compromises to intellectual property[9], act of information extortion and use of pirated software fall in the category of Internal threats while deliberate act of espionage or trespass, viruses or denial-of-service attacks, forces of nature, hacking, cyber frauds, email spoofing corresponds to External threats. Following figure shows clear classification between Internal and External threats. To make sound decision about information security, management must be informed about the various threats facing the organization, its people, applications, data and information systems. A Study of Information Security Policies Page 22 Chapter 1: Introduction Figure 1.9: Information Security in an Organization One of the greatest threat to an organization‟s information security is the organization`s own employees. Employees are the threat-agents closest to the organizational data. As employees use data in everyday activities to conduct the organization`s business their mistakes represent a serious threat to the confidentiality, Integrity and availability of data. This employee mistake can lead to entry of erroneous data, accidental deletion or modification of data, storage of data in unprotected areas such as desktops and website. One person`s carelessness can create a vulnerability with which organization may face major loss in the business. Much human error or failure can be prevented with training and ongoing awareness activities but also with the controls ranging from simplex to complex procedures. Now a day‟s viruses are most common threats to information systems. A computer virus consists of segments of code that perform malicious actions. This code attaches itself to the existing program and takes control of that program access to targeted computer. This is the most common method of virus transmission at the opening of twenty first century is via e-mail attachment files. E-mail programs prove to be a fertile ground for computer viruses unless they are suitably controlled. In general, as the organizational network grows to accommodate changing needs more robust technology solutions may be needed to replace security programs the organization has outgrown. A Study of Information Security Policies Page 23 Chapter 1: Introduction Today`s organizations are under immense pressure to acquire and operate integrated, efficient and capable applications. The modern organization needs to create an environment that safeguards applications using the organization`s IT systems, particularly those applications that serve as important elements of infrastructure of the organization. To address information security needs, each of the organization`s communities of interest must address information security in terms of business impact and the cost of business interruption, rather than focusing on security as a technical problem. Managing information security has more to do with policy and its enforcement than with the technology of its implementation. [10] Therefore researcher is identifying the domains of information security policy and their implementation by the IT companies in order to find out reduction in the risk of threats. A Study of Information Security Policies Page 24 Chapter 1: Introduction 1.12 ABSRACT OF THESIS AND CHAPTERISATION: 1.12.1 ABSTRACT OF THESIS (Scope of research) The scope of the research is restricted to Pune City or zone. The research is carried out to study status of information security policies in selected IT companies in Pune city. The 45 IT companies includes software, BPO and Hardware companies. The major parameters studied are training, implementation, best practices, IT plan and Risk Management. 1.12.2. CHAPTERISATION: The study is classified into following five chapters excluding Appendix. 1.12.2.1. INTRODUCTION: This chapter elaborates brief introduction about information security policies, definition, need, objective and scope of information security policies. It has highlighted on major issues related to IT Security breaches which have been recently happed. Different types of controls necessary to address these IT security breaches are also described as applicable to the organization. This chapter gives broad coverage to basic concepts such as History-Evolution and components of Information security, Information security policy, policy development life cycle, Risk and threats to information systems security, Information security management system, documentation and framework of the policy, classification of security policies, domains of security policies and Information security policy standards such as ISO 17799 and BS7799. 1.12.2.2. LITERATURE SURVEY: In this chapter summery of the information collected from various sources in the form of secondary data is available. The information is gathered from reference books, periodical and journals and many of the web sites. This information includes guidelines for effective information security management, overview of security principles intended for laws and policies as well as relation between policies, standards and practices. The Information of security policy infrastructure, policy design life cycle and policy design process are discussed in details from point of view A Study of Information Security Policies Page 25 Chapter 1: Introduction of formulating a questionnaire. The sample structure of policy and policy representation for three domains is also mentioned in this chapter. In some cases researcher has also collected information by attending workshops and seminars organized by Computer Society of India (CSI) and ISACA, Pune Chapter. 1.12.2.3. RESEARCH METHODOLOGY: This chapter includes information about sampling unit, sampling plan as well as sample size. It also further covers brief information about why and how the sample size is selected. Sampling procedure is also described which is mainly focused on random sampling method. This chapter also covers sources of collection of primary and secondary data. Objectives and hypothesis for the research is discussed in this chapter. Entire Research design phases such as sampling design, observational design, statistical design and operational design are described in this chapter. Collection of data through questionnaire is elaborated in details as the way it was conducted by the researcher. Various characteristics of collected data are also elaborated. The statistical tools and techniques which are needed for hypothesis testing are explained in operational design. 1.12.2.4. DATA ANALYSIS: This is the most important chapter of the research which provides information about steps involved in data analysis which begins with data processing. Data processing requires editing; coding, classification of collected data. Analysis of all domain related questions is made first. Emphasis of the chapter is more on hypothesis testing by using chi square test and simple Excel analysis where comparison is not required. SPSS SOFTWARE 11.0 is used for analyzing the data and representation in terms of cross tabulation in case of hypothesis testing. Hypothesis is tested for group of all IT companies together, as well as segment wise testing is also performed to know about the status between Software, BPO and Hardware companies. Tables, Graphs and charts are also shown in this chapter for the interpretation of data and hypothesis testing. A Study of Information Security Policies Page 26 Chapter 1: Introduction 1.12.2.5. CONCLUSION AND FINDINGS: Summary of entire thesis is available is this chapter. This chapter provides conclusion derived from data analysis for proving the hypothesis. It also gives coverage to expected outcome derived from data analysis. This chapter is also focused on expected findings along with conclusions and suggestions. It gives brief idea about the limitations for the researcher while conducting the studies and insight for further research work. A Study of Information Security Policies Page 27 Chapter 1: Introduction 1.13 REFERENCES: 1. Michaneal E.Whiteman and Herbert J. Maltord, Principles of Information Security, Second edition 2007, Thomson Technology, India Edition, Pg. [198-199] 2. Michaneal E.Whiteman and Herbert J. Maltord, Principles of Information Security, Second edition 2007, Thomson Technology, India Edition, Pg. [5-7] 3. The BS 7799/ISO 17799 Standard for better approach to Information Security by Jacquelin Bisson and Rene Saint German, posted on 15th June 2004 by www.callio.com and retrived on 18th December 2006. 4. http://en.wikipedia.org/wiki/File:CIAJMK1209.png, retrieved on 30th May 2009. 5. Tipton, Harold F. & Krause, Micki: Information Security Management Handbook, 6th Edition, 2008, Volume 2, Auerbach Publications, Taylor & Francis Group, Boca Raton, New York, Pg. [15-16]. 6. Thomas R. Peltier, Information Security Policies, Procedures and StandardsGuidelines for effective information security management, Auerbach Publications, 2002, Pg. 29. 7. Thomas R. Peltier, Information Security Policies, Procedures and StandardsGuidelines for effective information security management, Auerbach Publications, 2002, Exhibit 2, Pg. [177-178]. A Study of Information Security Policies Page 28 Chapter 1: Introduction 8. Tipton, Harold F. & Krause, Micki: Information Security Management Handbook, 5th Edition, 2004, Auerbach Publications, Taylor & Francis Group, Boca Raton, New York, Pg.751. 9. Michaneal E.Whiteman and Herbert J. Maltord, Principles of Information Security, Second edition 2007, Thomson Technology, India Edition, Pg. 39. 10. Michaneal E.Whiteman and Herbert J. Maltord, Principles of Information Security, Second edition 2007, Thomson Technology, India Edition, Pg. 37. A Study of Information Security Policies Page 29
© Copyright 2025 Paperzz