scholarly journals Human factor aspects in information security management in the traditional IT and cloud computing models

2021 ◽  
Vol 31 (1) ◽  
Author(s):  
Paweł Kobis

This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.

Author(s):  
Vadim Dronov ◽  
◽  
Galina Dronova ◽  
Victor Belov ◽  
Lev Grishchenko ◽  
...  

According to the Russian standards in the field of information security management (IS), which are authentic international standards, such as [1, 2], the organization must regularly conduct an internal audit of the information security management system. An audit is an independent review and evaluation of an organization's activities by analyzing and evaluating processes, projects, reports, and products. Audit, as an activity, is not static, unchanging, it evolves. From the point of view of leading international audit companies, in particular [3, 4], the current stage of audit evolution is the transition from reactivity (identifying shortcomings after the fact) to proactivity (predicting the results of actions or events before their completion). The validity of the statement for the Russian Internal Audit is confirmed by the results of the IX National Scientific and Practical Conference [5]. The movement towards proactivity in the audit determines the relevance of the following tasks: 1) processing up to 100 % of the information generated by the activity that is the focus of the audit; 2) processing information in a close-to-online mode; 3) the availability of powerful tools for data analysis and modeling on their basis the further development of the investigated events, as well as the appropriate skills of working with it from the auditors. When conducting audits, the auditors have a dilemma – on the one hand, they are obliged to provide the owners/shareholders/management of the organization with data as close as possible to the reliable state of the information security management processes, information about the identified shortcomings and recommendations for their elimination, on the other hand: the audit time is strictly limited; unloading the initial data from the organization's information systems takes considerable time; the data obtained from various information systems and other sources have different, not always standard formats; the tools used have disadvantages, since the most frequently used spreadsheets (MSExcel, LOCalc), due to internal limitations, are no longer able to provide the required functionality. The above-mentioned factors, as well as other factors, such as unwillingness to cooperate, hidden opposition of the personnel of the audited organization, evaluation of the work of auditors only by quantitative indicators (the number of observations or the time spent on one observation), lead to the fact that the checks are carried out superficially. At the same time, shortcomings in the information security management processes can be detected, but it becomes difficult to explain their nature and give effective recommendations to the business auditor. As a result, the goal of independent audits defined in GOST ISO/IEC 27002-2012 – “ensuring confidence in the continued efficiency, adequacy and effectiveness of the organization's approach to information security management” [2] – cannot be achieved. One of the options for eliminating some of the above-mentioned shortcomings is the use of programs developed by the auditors themselves and designed for operational data processing, the so-called “small automation”, during audits. This approach, although it is a low-level link in the chain of automation of audit procedures and, nevertheless, is within the framework of the audit development paradigm in the direction of robotization of procedures and the use of artificial intelligence, which is discussed, for example, in the works [3, 6, 7], and also confirmed by the results of conferences of the Institute of Internal Auditors [8].


2014 ◽  
Vol 536-537 ◽  
pp. 616-619 ◽  
Author(s):  
Bang Fan Liu ◽  
Hui Hui Zhong ◽  
Meng Wang

Information security is a core issue to ensure the smooth implementation of e-government. On the one hand, cloud computing promote information security management from centralized to decentralized. Help to improve the ability of the information security of e-government. On the other hand, it can not be ignored that the unprecedented openness and complexity of cloud computing also threat to information security of e-government. In this paper, we shall discuss the building of the cloud computing information security of e-government from three aspects of technical, management and law.


2012 ◽  
Vol 61 ◽  
pp. 07-30
Author(s):  
Saulius Jastiuginas

Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą, aptariant saugumo sąvoką būtina įvardyti objektą, t. y. kas turi būti (tapti) saugu. Analizuojant informacijos saugumo mokslinių tyrimų problematiką, galima daryti prielaidą, kad pagrindinis objektas, kurį siekiama apsaugoti, yra informacija, tačiau neretai saugumo objektu virsta informacinės technologijos ar informacinės sistemos, kuriomis tvarkoma informacija. Darant esminę mokslinę prielaidą, kad svarbiausias informacijos saugumo objektas yra informacija, tikėtina, kad informacijos saugumas turėtų būti tiriamas kaip sudėtinė informacijos vadybos ir kitų gretutinių informacinių koncepcijų (informacijos išteklių vadybos, informacijos sistemų vadybos, informacijos įrašų vadybos) dalis. Straipsnyje aptariamas tyrimas, įrodantis keliamos mokslinės prielaidos pagrįstumą.Pagrindiniai žodžiai: informacijos saugumas, informacijos saugumo valdymas, informacijos vadyba, informacijos saugumo valdymo modelis.Integral Information Security Management ModelSaulius JastiuginasSummaryAnalysis of the currently most widely applied means of information security management (methodologies, standards, models) allows finding a growing assimilation of media content, but the frequent information security problems (for example, information security incident growth), show that the existing measures do not provide sufficient information security management.The analysis of information security research problems shows that the main object is to protect the information, but it often becomes the subject of security information technology or information systems that support information processing.A substantial scientific assumption is that the primary object of information security is information, it is likely that information security should be studied as an integral part of information management and the other related concepts (information resourcemanagement, information systems management, information, records management).The analysis of the information management has shown that the security component of informa30tion management is not developed. Scientific insight, emphasizing information as a critical resource organization, poor information management, focus on the resource security becomes a relevant scientific problem and do not provide scientific information security management problems that are apparent on the practical level.The aim of the study was to create a scientific basis for the integral management of information security model that integrates information security management and information management components.The paper deals with the basic information management tools and practices of information security management possibilities. The results of the analysis helped to reduce the gap in research and to develop a theoretical basis for the integral form of information security management model.The proposed theoretical model and the integrated security information management component extend the possibilities of secure information management.The aim of the article was to create a scientific basis for the integral model of information security management that integrates information security management and information management components.The paper analyzes the main information management tools and opportunities to use them for information security management. The results of the analysis helped to reduce the gap in scientific research and to develop a theoretical basis for the integral information security management model.


10.28945/3055 ◽  
2007 ◽  
Author(s):  
Mariana Hentea

The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computing systems based on intelligent techniques that support continuous monitoring and controlling plant activities. Intelligence improves an individual’s ability to make better decisions. This paper presents a proposed architecture of an Intelligent System for Information Security Management (ISISM). The objective of this system is to improve security management processes such as monitoring, controlling, and decision making with an effect size that is higher than an expert in security by providing mechanisms to enhance the active construction of knowledge about threats, policies, procedures, and risks. We focus on requirements and design issues for the basic components of the intelligent system.


Sign in / Sign up

Export Citation Format

Share Document