Wednesday, July 17, 2019
The Need for Information Security Management to Medium Size
The get for study bail counseling for dainty to intermediate size of it Enterprises ICT 357 In rollation protection Management Leong Yuan Zhang 31741147 Trimester 1 Murdoch University table of contents Abstract2 Introduction2 Justifying The Need for Sound training guarantor in Any establishment2 Linking line of reasoning Objectives with protective coering3 fortuity response Management and disaster Rec everywherey4 wide awake Device gage Managment5 Biometric hostage Devices and Their Use6 respectable Issues in breeding credential Management7 protective cover gentility and Education7Def eat uping Against Internet-Based Attacks8 Industrial Espionage and Business parole Gathering9 Personnel Issues in reading security department9 physiological credentials Issues in breeding tribute10 Cyber forensic misadventure Response10 Conclusion11 References11 Abstract Sm each to moderate Size Enterprises (SMEs) contribute greatly to the parsimoniousness in legion(pr edicate) a(prenominal) countries despite the m both(prenominal) ch entirelyenges that they face. Lesser budgeting, resource readiness and time heed be just whatsoever of the limitations that they baron encounter.Comparing this to a monolithicr effort or g every gravelnment body, SMEs get togetherms to pass on polar approaches with regards to randomness shelter measures, onetime(prenominal)s belowstating the vastness collect to the constraint mentioned. This paper functions to study the issues relating to launching and implementation of selective selective info protection regimes in SMEs comp atomic number 18d to larger geological formations. Introduction Small and median(a) enterprise ar delimitd by the number of personnel working for the comp whatever, virtuallywhat the upper limit of 250 to the lower of 50. They greenly lack resources, competencies and watchfulness to implement strategies outwardly and internally for their operations.This paper go forth point on the implementation of schooling credentials regimes of SMEs and contribute a comparison to large enterprises. The paper explores the multiple categories of information certification, feat to list the disadvantages faced by SMEs and how al just about(a)time large enterprises atomic number 18 unable to concord a SME in the cap cogency to suffice to gage threats Justifying The Need for Sound Information Security in Any Organisation The internet age brought upon cutting challenges to the seam world, twain SMEs and large put inment argon continuously investing substantial resources to prep argon their nominal head on the internet.With increasely virtualized trans accomplish entanglements and expanding corporate ecosystem, more than than information pick out been created or converted into digital format. Digitalized information cig bet be saved in variant terminal maneuvers and transmitted over a plethora of interconnected network both in ternally and externally (Radding, 2012). Understandably, abomination and tribute threats to information are seemly more rough-cut entrust as the reliance on Internet in short letter sector activities increase .Threats oftentimes(prenominal) as hackers, championship competitors or veritable(a) foreign governments give the axe employ a host of different manners to obtain information from any organisation (Symantec). Yet no utile vocation would totally isolate themselves from development digitalized info to prevent much(prenominal)(prenominal) pass onings competitiveness or success of these organisations is linked to repair information delivered on time. At its worst preposterous info whitethorn result in serious firing of potential internet and damage to the organisations brand(Juhani Anttila, 2005).A bell ringerifi send awayt broker of information tribute are the represent and personnel expertness required with the designing, victimisation and implementa tion of an effective aegis system. in that respect is a need for major investiture to be invested to build and maintain reliable, authoritative and responsive aegis system (Anderson, 2001). Since closingly SMEs persist to deport to operate under tight budgeting, extreme restrain custody and many different necessarily competing for limited supply of resources, thus placing information tribute down the priorities list (Tawileh, Hilton, Stephen, 2007).Additionally, the lack of cognizance to the negative consequences of info aegis issues and threats and the scholarship of less strict regulatory shape requirements, information and communications infra coordinate at bottom these SMEs remain highly un effectived. Despite that, closely organisations do at least dupe round form of basic protection in the form of anti-virus bundles. Other signs of security software analogous firewall or stylemark software/ onerousware are advantageously less popular perhaps ref erable to the additional complexity of having to install and configure them for the organisation utilization (ABS, 2003).Linking Business Objectives with Security Security arouse impact a companys profitability in both absolute or negative ways. It fully depends on how it is be controlled, too unretentive impart non be enough time too much may get to bottlenecks within the company internal processes. champion example would be background checks on possible new employees. At times, the while of the check may take all-night than the period of meshing, especially when hiring temp mental faculty to cover short term. In their book, Christian Byrnes and Paul E.Proctor argues that to eliminate the last 20% of risk that might occur would mutually required 80% more currency to implement which tail be seen in Figure 1. Figure 1 It is common practice in large organisations to align com put toge in that locationr security round technologies, with a give department running the tape alongside the IT department. However computer security should be more line of products orient as it is easier to master the security charges if considerably business practices are being followed. For SMEs, it is in addition far easier to utilise xisting employees who specialize in specific business roles to take up security positions. In the same book, Christian Byrnes and Paul E. Proctor excessively provided a table which list down the common security roles and the brainl personnel to treat it Table 1 Linking security with business visions is also important as it would throw overboard for infract persuasion to the top managements to pass or push with with security purchases, master plans or policy changes. To achieve this, the motion put forth essentialiness(prenominal) undergo a 5 standard structured framework assess, analyse, strategize, align and communicate.Assess the companys online and future security role so as to achieve a better understanding of the legitimate security model. flesh out on the security capabilities within the employees, processes and current technologies should be documented properly for the future(a) step to be carried out with more accuracy. After collecting the raw selective information, utilise analytical tools and method to conduct a security gap analysis get out show the differences between the current security model and the preempted requirements. With a stupefy free overview of what needs to be do, next phase proviso plenty be done to dapple together to form a feasible and strong strategy.Executives and managers at all levels moldiness understand the new steps that are to be underinterpreted for the new strategy. Such communications may be more effective in SMEs than larger organisations as the members of the security plan may be detect personnel that are required to act rather than a separate IT security team up (Pricewaterho practice sessionCooper). Incident Response Management an d Disaster Recovery Incident re resultant role management is the process of managing and responding to security contingencys. As organisations may encounter plenty of incidents end-to-end the day, it is important that incident rejoinders are conservatively anaged to reduce wastage of manpower and resources. The about conquer level of consequence should be appoint to on any security incident to increase efficiency there is no merit in involving higher-ranking management in a receipt to an incident that has minimal impact on business (BH Consulting, 2006) Disaster retrieval is the process use to recover entree to an organisations software, data and hardware that are required to resume the work of normal, precise business functions. Typically this will happen after either a natural disaster or manmade disaster. (Disaster Recovery)Incident reply management utilise to be disjointed into different entities, natural disasters , security breaches and secretiveness brea ches were handled by risk management, information security department and legal department. This change magnitude the apostrophize of incident management and reduce tangible exercise of existing resources and capabilities. By merging the 3 into one overarching incident management methodology specified with an incident response team and a charter, cut back cost and streamlined usage of resource fecal matter be achieved (Miora, 2010) In larger organizations, incident response team may contain both employees and third party observers from vendors.External vendors may provide the expertise to manage an incident that could be overwhelming to the current employees. This however may non be feasible for SMEs referable(p) the financial constraints. Most likely, the incident response management team would be create use current employees and a senior management personnel would lead the team. The response team would be the ones who do the planning scenario for each different types of incident and the type of responses required, control that derive processes and procedures are in place so that responses to incident are coherent.Communications between members are usually interchangeable be it for large organisations or SMEs method of contact much(prenominal) as emails and non-email like phone calls or messages are used to inform team members (BH Consulting, 2006). Disaster retrieval exceedingly important as well, more so for SMEs. A survey from US Department of Labor provided an estimation that around 40% of business never reopen after a disaster and of the remain around 25% will close down within 2 long time (Zahorsky). Unfortunately, not many SMEs have a disaster recovery plan in place to protect themselves.This is due to the idea that disaster recovery is costly and requires alot of resources and expertise to put in place one. This is true to a certain extend as large organisations normally spend dos to put in place backup servers and removed(p) ho t recovery sites. However with increasing cloud-establish technologies and availability of server virtualization, disaster recovery mountain become affordable even for SMEs. Up and coming cloud solution and renting space in unshakable data center via colocation are some of the solutions that SMEs can consider.Even without any or little IT staff, by paying the colocation provider they can assist to manage the setup and victuals operate (Blackwell, 2010). Mobile Device Security Managment The increasing sophisticated wide awake devices together with high bandwidth network is creating a fearful security management challenge for CIOs and former(a)(a) IT professionals. Proprietary and mystic data can now be moved external of the secure perimeter of the enterprise and onto roving devices that can be brought anywhere in the world by employees.These devices have a descriptor of data communication and storage technologies, such(prenominal)(prenominal)(prenominal) as email/PIM sy nchronising software, infrared data transmission, Bluetooth and removable data storage. As a result, it is easy for busy devices to become strongholds of enterprise information ( pricy applied accomplishment, 2009). Of public life with that brings additional threats to an organisation as spry devices are susceptible to attacks as well. In both SMEs and large organisations, there is a definite need to regulate the use of mobile devices to prevent information leakage.As they can used in a variety of locations outside the organizations control, such as employees homes, coffee shops, hotels, and conferences, this cultivates them much more likely to be lost or stolen than different devices, so their data is at increased risk of compromise (Souppaya & Scarfone, 2012). The most extreme operation of mobile device management can be see within government bodies, specifically in the defense sector where secondary functions of such devices such as cameras are to be disable. However, thi s method would not be comfortably applied to SMEs as employees may descry it to be too restrictive.Rather, having a clear policy on the usage of mobile devices and prohibiting employees from attaching their devices to the work displace would be a better selection to enforce. Biometric Security Devices and Their Use Biometric devices identifies an individual through physical or behavioral characteristics such as fingerprints, palm geometry or retina. It is extremely secure as it cannot be borrowed, stolen or forgotten (Liu & Silverman, 2001). The table below shows the respective(a) type of biometric devices and their advantages/disadvantagesThe table, as seen in the plow from Dell explains clearly some of the limitations of biometric devices. Size for example essential be taken into consideration as well, hand geometry scan devices are bulky and therefore not suited for say unlocking your workstation as compared to using it to unlock a door. However, not many organisations are adopting biometric as part of their security plan. Those that do use biometric are mostly geared towards physical security of secure areas where access are to be restricted.Conventional trademark methods are still much like with regards to virtual access like emails, workstations and applications. The higher(prenominal) cost of using biometric devices as a security solution is also another(prenominal) concern for SMEs that wishes to utilise them. They would need to valuate their nature of business, how and where biometric would fit in to maximize value for money. Ultimately, aligning the need for biometric security devices as a security solution to business objectives is a must, else cheaper alternatives would have to be examine and evaluated instead.Ethical Issues in Information Security Management Some professions such as law and medicine have in place a codified set of ethics that its practitioners are required to prize to protect the retirement of their clients. Violations are dealt with in the harshest possible terms, and even minor lapses can result in significant penalties. For IT however, there are no such codification. Technology professionals generally abide by ad hominem codes of conduct and are essentially self-policing. Additionally, engine room stand ups complexities that go beyond typical questions of whats right or whats fair.Areas such as data access and capture, touch speed, tracking and monitoring, and line of descent redesign are just a few examples of IT capabilities with respectable considerations. (Relkin, 2006) Both SMEs and large organisations have to be able to cope with good issues such as privacy of private information, intelligent property and cyber crime. In an effort to precaution company secrets, many employees can be exposed to electronic or other forms of surveillance. Email screenings and monitoring internet usages are just some of the methods that can be employed.There is a need to clearly define policies tha t involve such practices and the boundary must be draw and communicated to all employees so as to safeguard the organisation from breaching privacy laws and from being sued by employees. (Tiwary, 2011) Security teach and Education Security training and reproduction is becoming increasing important for employees due to emergence of end- user computing as an vituperative component of information security. A typical end-user has access to most vital information that an organisation has in its ownership.They have cognition of how protection systems put in place to secure information work and a small amount of more gifted users may even know how to ticktack those systems. Most users however lack the noesis that is required to divine service protect the organisation information and it is in this area that they should be educated in hunting lodge to make better decisions when facing with threats and vulnerabilities that can be discovered during the course of work. (Hight, 2005) Sec urity Education, Training and Awareness design otherwise cognize as SETA is designed to set the security tone to the employees of an organisation. do it part of a new employees orientation will ensure that all employees know and understand the reasons of the security policies that are in place at any organisation. Implementation of such a program can be done at any organisation, requiring exclusively properly create verbally security policies and outlining guidelines that have to be followed. A good security program ensures that end user mistakes can be reduced and that employees understand the consequences of their actions when using their work stations or insert unauthorised USB devices into them. support Against Internet-Based AttacksWith an increasing reliant upon the internet, internet based attacks have been slowly increasing. Organsations that has a presence over the internet or utilizes weather vane based technologies are more prostrate to such as attacks. Internet wor ms, viruses, malware and distributed demur of service are just some of the types of threats that could occur. Organisations should look to prevent such incidents from occurring by securing applications that are made available over the internet and securing organisation infrastructures exposed over the internet (Klein, 1999).To apply out an attack, the assaulter must first obtain capable control over a target system. They would most likely do some reconnaissance on the target, performing a number of scans to looked for weaknesses. Areas like remote loving network services in disregard OS kinds, sendmail, sshd, RPC and Windows file sharing are some of the services exploited. Ports that are unsecured, computer storage handling, targeting applications like meshwork web browsers and plug ins are also some of the methods that attackers can use.The web browsers in particular are see a rising trend of being targeted as browsers are extremely flat to having exploitable vulnerabili ties. The internet distribution model also allows attackers to attack a users web browser without even coordinately connecting to the cilent planting malicious coding at specific websites where the user normally visits will achieve the aim as well (Moshchuk, 2000). Prevention of such attacks are extremely important, firewall and anti viruses are just the tip of an iceberg when it comes to methods that can protect an organisations information.Many firewalls being sold at once are considered application aware and can understand protocols and commands that are being used. This allows them to pick up whether or not incoming merchandise to any applications or network services are malicious or not. aright set up application aware firewall would be able to prevent common attacks thru telnet, SSH, HTTP, FTP, SMTP, drink and applications which can be vulnerable. Additionally impingement Detection systems (IDS) and Intrusion Prevention systems (IPS) can also be used against application or network based attacks.When diametrical together with an application aware firewall, some intrusion detection systems have the ability to thwart off attackers by talk of the town directly to the firewall to block the source IP address. There are no right or wrong solutions to defending an organisations network, it all boils down to which products would be suited to the organisations needs. SMEs typically would use more of off the ledge type of applications and intrusion detection legal profession system (integrated data processing) would be a better fit for such applications.Off the shelves applications uses alot of common protocols such as FTP, HTTP etc that should adhere to RFC standards and IDP is configured to block malicious or dealing that does not comply with RFC standards automatically. For larger organisations, they tend to have third party or home grown applications which developers may or may not have complied with RFC standards, IDP solutions may not have much of an effect for them. Industrial Espionage and Business comprehension GatheringEvery organisation in the world will have collected some form of information regarding their competitors, through market scanning, industrial profiling or even direct hire of employees from their competitors. Such perception collection are definitely part and computer software activities used for market research and benchmarking. However, there are uncertain boundaries separating competitive experience multitude and industrial espionage. The laws in place at times are unable to set such limits and it would seem apt to define industrial espionage as intelligence practices of questionable ethics instead (Crane, 2005).Be that as it may, industrial espionage is a very critical threat against SMEs. A succesfully SME breaking in saturated markets would have attained some form of breakthrough in order to stand out. Regardless of whether it is a formulae or business process, competitors would wish to obtain such noesis in order to raise their own profiles. To safeguard their secrets, SMEs would have to ensure that their security system in place are adequate and their employees educated on the topic. SMEs have to identify that information that would critically harm the company and the value of such information to the company and its competitors.Access to such flower jewels must be controlled and employees must be educated on security consciousness programs. Despite that, employees are still the strongest and weakest link. populace tend to react better to carrots than sticks and most of the time competitors would aim for that. Hiring professionals to perform fond engineering, blackmailing, lure of monetary gains are hard to prevent. (Podszywalow, 2011) Personnel Issues in Information Security Human related security issues are extremely problematic and complex in organizations.They involve all the individuals who make up the organization, from top-level managers to clerical staff. It is crucial that the top management recognize that for security management to in the end succeed, not only the technical belongings must be taken into account, the military mans aspect of security must not be ignored as well. pack issues within an organisation can have an impact on its ability to effectively manage security. Uncommitted and un knobbed senior managers unqualified, untrained and careless employees former dissatisfy employees and organizational members resistance to change are just some of the potential issues ertaining to human resource that might occur. Hence, to achieve security effectiveness, these issues must be addressed as a whole (Goh, 2003) For SMEs, when hiring an new employee, the employment contract should expressly emphasize the employees certificate of indebtedness to reserve certain types of information confidential both during and after the employees tenure. The language and structure of the contract should be made clear so as to prevent any p otential misunderstanding or any loopholes that can be exploited. The employee must sign the organisation before he or she begins to work.The contract can also be included with an employees personal file to keep track. Even when exiting, care must be taken to ensure that documents, records and other information concerning the company proprietary assets in the possession of the leaver must be surrendered and returned to the company. Conducting a exit interview will help to refresh the terms of employment agreement and trade secret law with the leaver. The employee should be acknowledge in writing that he or she is aware of the obligations and will not disclose any trade secrets of the former employer.Physical Security Issues in Information Security Physical security breaches can sometimes be more devastating than technical breaches like worm attacks. The loss of data, loss of availability either from systems being closed in(p) down or by washout or arson must be considered when de aling with physical security. With the invention of easily concealable USB drives or bombs, coupled with unauthorized access is makes physical security becoming more important. Data transfer speeds have increased as when, allowing for transferring of a large amount of data in a relativity theory short period of time.As with any other security planning, physical security must be included to ensure that the risk of above mentioned are reduced. Access to areas such as server rooms or routers or where documents are kept and archived must be control, just locking the doors doesnt seems to be enough now. Access control cards, biostatistics system can ensure that only authorised personnel be allowed in. Securing the personal computer of employees, especially if they are using laptop is equally important. Laptop locks and OS hardening to prevent unauthorized usage of USB devices are not allow (Giannoulis & Northcutt, 2007).Cyber rhetorical Incident Response electronic computer forensics is the science of acquiring, retrieving, preserving, and presenting data that has been processed electronically and stored on computer media. When paired with incident response, their job becomes more challenging. They would have to find where a breach occurred, plug the hole, then croak to get the affected server or servers back into service, and then if possible, gather proof on the intruder for further action and analysis (Daniel & Daniel, 2009)SMEs unfortunately with their limited resources may have to compromise. instead of having a dedicated team to deal with incident response, they might consider getting current employees involved within IT such as server, networking or on site support engineers to carry out such a role. If they have supernumerary budget however, it would work to their wellbeing if they send their resposne team for courses pertainning to cyber forensic. The additional knowledge will allow the response team to perform more effectively should a threat occu r ConclusionSmall and medium enterprises typically faces the same the type of threats that will happen to larger organisations, however their approach and response to the same threat may differ greatly due to the limited resources human, technical, physical available to them. SMEs will have to sometimes think out of the box and be very careful in planning resources for security within the company. The type of hardware, software used for security may be similar to larger organisations however, the setup and configuration may be miles apart as well. SMEs, will have be extra vigilant against information security threats.References (n. d. ). Retrieved march 10, 2013, from Symantec http//securityresponse. symantec. com/avcenter/security/Content/security. articles/corp. security. policy. hypertext markup language ABS. (2003). Business Use of Information Technology (2001 02). capital of Australia Australian Bureau of Statistics. Anderson, R. J. (2001). Why Information Security is Hard A n Economic Perspective. in Proceedings of the Seventeenth computing device Security Applications Conference (pp. 358-365). IEEE Computer Society Press. BH Consulting. (2006). Incident Response White Paper. Dublin BH Consulting. Blackwell, G. 2010, whitethorn 25). Disaster Recovery For Small Business. Retrieved walk 13, 2013, from Small Business Computing http//www. smallbusinesscomputing. com/biztools/article. php/10730_3884076_2/Disaster-Recovery-For-Small-Business. htm Crane, A. (2005). In the company of spies When competitive intelligence gathering becomes industrial espionage. Nottingham International Centre for incorporated Social Responsibility. Crist, J. (2007). sack Based Attacks. SANS Institute. Daniel, L. E. , & Daniel, L. (2009, kinfolk 30). How Is Computer Forensics Different from Incident Response?Retrieved meet 13, 2012, from ExForensic http//webcache. googleusercontent. com/search? q=cachehttp//exforensis. blogspot. com/2009/09/how-is-computer-forensics-differen t. hypertext markup language Disaster Recovery. (n. d. ). Disaster Recovery. Retrieved display 13, 2013, from Disaster Recovery http//www. disasterrecovery. org/ Giannoulis, P. , & Northcutt, S. (2007). Physical Security. Washington Security Laboratory IT Managers Safety Series. Goh, R. (2003). Information Security The Importance of the Human Element. Singapore Preston University. Good Technology. (2009). Mobile Device Security. Good Technology.Hight, S. D. (2005). The importance of a security, education, training and awareness program. Householder, A. , Houle, K. , & Dougherty, C. (2002). Computer attack trends challenge Internet security. IEEE Computer , 35 (4), 5-7. Juhani Anttila. (2005, surround). Retrieved March 13, 2013, from QualityIntegration http//www. qualityintegration. biz/InformationSecurityManagement. html Kelly, L. (2011, November). The top five SME security challenges. Retrieved March 13, 2013, from ComputerWeekly. com http//www. computerweekly. com/feature/The-t op-five-SME-security-challenges Klein, D. V. (1999). reason against the wily surfer Web based attacks and defense. California The USENIX Association. Liu, S. , & Silverman, M. (2001). A mulish Guide to Biometric. IT Pro. Miora, M. (2010). Business Continuity. Los Angeles, California, USA. Moshchuk, A. N. (2000). Understanding and Defending Against Web-borne Security Threats. Washington University of Washington. Podszywalow, M. (2011, November 29). How to Detect and pointedness Corporate Cyber Espionage. Retrieved March 13, 2013, from The Data mountain range http//www. thedatachain. com/articles/2011/11/how_to_detect_and_stop_corporate_cyber_espionagePricewaterhouseCooper. How to align security with your strategic business objectives. PricewaterhouseCooper. Proctor, P. E. , & Byrnes, F. C. (2002). The Secured Enterprise Protecting Your Information Assets. New Jersey Prentice Hall. Radding, A. (2012, January 04). Retrieved March 10, 2013, from Brainloop http//www. brainloop. com/f ileadmin/assets/PDFs/White_Papers/brainloop_white_paper_info_sec_options. pdf Relkin, J. (2006). 10 ethical issues raised by IT capabilities. CNET Networks Inc. Souppaya, M. , & Scarfone, K. (2012). Guidelines for Managing and Securing Mobile Devices in the Enterprise.National Institute of Standards and Technology. Tawileh, A. , Hilton, J. , & Stephen, M. (2007). Managing Information Security in Small and Medium Sized Enterprises A Holistic Approach. Information Security Solutions Europe Conference, (p. 11). Warsaw. Tiwary, K. D. (2011). Security and ethical issues in it An organisation perspective. International daybook of Enterprise Computing and Business . Zahorsky, D. (n. d. ). About. com. Retrieved March 13, 2013, from Disaster Recovery Decision Making for Small Business http//sbinformation. about. com/od/disastermanagement/a/disasterrecover. htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.