Development of an Information Security Management Model for Enterprise Automated Systems

Author(s):  
Thamer Alhussain ◽  
Ahmad Ali AlZubi ◽  
Osama AlFarraj ◽  
Salem Alkhalaf ◽  
Musab S. Alkhalaf
2012 ◽  
Vol 61 ◽  
pp. 31-58
Author(s):  
Saulius Jastiuginas

Pirmieji informacijos saugumą reglamentuojantys dokumentai Lietuvoje patvirtinti prieš 15 metų. Pirmasis informacijos saugumo strateginis dokumentas taip pat jau pradėjo skaičiuoti antrą dešimtmetį. Nuolat kintantis informacijos saugumo praktinis problematikos laukas lėmė ne vieną šių dokumentų atnaujinimo iteraciją bei nemažai informacijos saugumo stiprinimo veiklų. Dauguma šių veiklų apsiribojo techninių ir administracinių priemonių taikymo nustatymu bei formalizavo atsakomybes, susijusias su informacijos saugumu, užtikrinimą.Vertinant tiek globalų, tiek Lietuvos informacijos saugumo valdymo mokslinių tyrimų kontekstą galima pastebėti, kad šalia ilgą laiką vyravusios technologinių sprendinių taikymo problematikos ryškėja aktualūs žmogiškieji, ekonominiai ir kiti klausimai, kyla platesnio vadybinio požiūrio poreikis ir tampa akivaizdu, kad esamos praktinės informacijos saugumo valdymo priemonės nebėra pakankamos informacijos saugumui valdyti. Sprendžiant šią problemą, kaip nauja priemonė galėtų būti pagalbus teorinis integralus informacijos saugumo valdymo modelis, sujungiantis informacijos saugumo valdymo ir informacijos vadybos dedamąsias.Šio straipsnio tikslas – aptarti atliktą teorinio integralaus informacijos saugumo valdymo modelio praktinio pritaikomumo tyrimą. Praktinio pritaikomumo tyrimas atliekamas vertinat informacijos saugumo valdymą Lietuvos valstybės institucijose. Straipsnyje aptariamam tyrimui buvo keliami šie uždaviniai: suformuoti informacijos saugumo valdymo Lietuvos valstybės institucijose vertinimo prieigą; atlikti atvejo analizę – dokumentų turinio analizės metodu išnagrinėti teisės aktų bazėse ir Lietuvos valstybės institucijų svetainėse skelbiamus norminius dokumentus, reglamentuojančius informacijos saugumo valdymą; gautus analizės rezultatus pagrįsti kokybiniu tyrimu – ekspertų apklausa.Straipsnyje pateikti tyrimų rezultatai leido patvirtinti integralaus informacijos saugumo valdymo modelio pagrįstumą, įvertinti informacijos saugumo valdymą Lietuvos valstybės institucijose, identifikuoti trūkumus, pateikti praktinio problemų sprendimo siūlymus ir sukurti prielaidas tolesniems moksliniams tyrimams.Straipsnis parengtas remiantis dokumentų turinio analizės, lyginamosios analizės, dokumentiniu atvejo tyrimo, kokybinio tyrimo (ekspertų apklausos) ir apibendrinimo metodais.Pagrindiniai žodžiai: informacijos saugumo valdymas, integralus informacijos saugumo valdymo modelis, Lietuvos valstybės institucijos.Integral information security management model for Lithuanian state institutionsSaulius JastiuginasSummaryThe information security management research analysis shows that for a long time the technological solutions of research problems have dominated, but lately more relevant have become the human, economic and other issues, and there is a need for a more managerial approach. It is obvious that the current practice of information security management tools is no longer adequate for information security management. As a new instrument to address this problem, a theoretical integral information security governance model could be used. It combines the information security management and information management tools.The article aims to discuss empirical study as a theoretical integral information security management model that could be applied in practice. The practical applicability of the model was checked in in the Lithuanian state institutions. The paper discusses the study which has the following objectives: development of information security management in the Lithuanian state institutions evaluation approach, analysis of a case – the content analysis method to examine the legislative databases published in normative documents concerning information security management and proving the results through qualitative research (expert interview).The paper presents the research results which confirm the validity of the integral theoretical information security management model and allows to assess information security management in the Lithuanian state institutions, to identify the shortcomings, to make suggestions for practical problem-solving and create conditions for the further research.


Author(s):  
Mariana Hentea

Information assurance is a continuous crisis in the digital world. The attackers are winning and efforts to create and maintain a secure environment are proving not very effective. Information assurance is challenged by the application of information security management which is the framework for ensuring the effectiveness of information security controls over information resources. Information security management should “begin with the creation and validation of a security framework, followed by the development of an information security blueprint” (Whitman & Mattord, 2004, p. 210). The framework is the result of the design and validation of a working security plan which is then implemented and maintained using a management model. The framework serves as the basis for the design, selection, and implementation of all subsequent security controls, including information security policies, security education and training programs, and technological controls. A blueprint can be designed using established security models and practices. The model could be proprietary or based on open standards. The most popular security management model is based on the British Standard 7999 which addresses areas of security management practice. The recent standards, called ISO/IEC 27000 family, include documents such as 27001 IMS Requirements (replaces BS7799:2); 27002, Code of Practice for Information Security Management (new standard number for ISO 17799); and 27006, Guidelines for the accreditation of organizations offering ISMS certification, and several more in development. Similar security models are supported by organizations such as NIST, IETF, and VISA. From one point of view, information security management evolved on an application of published standards, using various security technologies promoted by the security industry. Quite often, these guidelines conflict with each other or they target only a specific type of organization (e.g., NIST standards are better suited to government organizations). However, building a security control framework focused only on compliance to standards does not allow an organization “to achieve the appropriate security controls to manage risk” (ISM-Community, 2007, p. 27). Besides technical security controls (firewalls, passwords, intrusion detection systems, disaster recovery plans, encryption, virtual private networks, etc.), security of an organization includes other issues that are typically process and people issues such as policies, training, habits, awareness, procedures, and a variety of other less technical and nontechnical issues (Heimerl & Voight, 2005; Tassabehji, 2005). All these factors make security a complex system (Volonino & Robinson, 2004) and a process which is based on interdisciplinary techniques (Maiwald, 2004; Mena, 2004). While some aspects of information security management changed since the first edition of the chapter (Hentea, 2005), the emerging trends became more prevalent. Therefore, the content of this chapter is organized on providing an update of the security threats and impacts on users and organizations, followed by a discussion on global challenges and standardization impacts, continued with information security management infrastructure needs in another section, followed with a discussion of emerging trends and future research needs for the information security management in the 21st century. The conclusion section is a perspective on the future of the information security management.


Author(s):  
Segundo Moisés Toapanta Toapanta ◽  
Madeleine Lilibeth Alvarado Ronquillo ◽  
Luis Enrique Mafla Gallegos ◽  
Alberto Ochoa Zezzatti

Public organizations have the ongoing task of properly managing the security of the information they handle. The objective of this research is to analyze the security standards adopted by public organizations in Ecuador to improve their management of information security. The deductive method was applied for the review and analysis of appropriate standards for public institutions. As a result, information was obtained on the different security policies, standards and guidelines that apply, national and international public organizations. A Diagram of activities for the adoption of standards for public organizations resulted; a prototype standards-based Information Security Management Model; and an Information Security Management Matrix, from which the Risk Mitigation Percentage was calculated. It was concluded that maintaining high levels of security in public organizations requires the adoption of control standards in different areas and the collaboration of the different organizational and hierarchical levels of public organizations.


Sign in / Sign up

Export Citation Format

Share Document