Information Security Management Introduction Flashcards
Governance
‘The rules that run an organisation including, policies standards and procedures.’
Governance is about how the business is run. It is about how the organisation is managed, the oversight and accountability required to demonstrate active involvement by management.
Corporate Governance
Corporate governance is the system and rules that companies must follow to make sure they are run properly and for the right reasons. This includes the way people work together and the rules they need to follow.
IT Governance
IT governance is a type of corporate governance that concentrates on making sure that the organization uses its IT resources in the most effective and efficient way possible to accomplish its objectives.
Information Governance
This refers to the guidelines, methods, regulations, and steps that an organization employs to handle information in a uniform way.
Security Governance
Security governance is a set of procedures that help an organization in defining, supporting, and managing its security efforts, which are linked to information, IT, and corporate governance. The aim is to ensure that the organization meets its needs concerning regulatory compliance, risk management, and operational requirements.
Information Assurance
We usually hear about this in the context of making sure information is safe, which is called Information Assurance. This means making sure information is used, processed, stored, and sent in a secure way. It also includes taking care of the systems and processes that are used to manage this information.
Information Security
Information security is all about protecting information and information systems from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Cyber Security
Cyber security is frequently interpreted as being the same as information security but in reality, there is a subtle difference. Cyber security is more about the technology used to secure systems and products rather than governance.
The Security Triangle
The Security Triangle consists of security, functionality and ease of use.
The CIA Triad
Information security has three main parts, called Confidentiality, Integrity, and Availability. Think of them like a triangle, with each one being a corner of the triangle.
Confidentiality
We should only let authorized people see information, and we need to protect it so it doesn’t get shared by accident or on purpose. To make sure information stays confidential, we can use things like encryption or access controls to limit who can see it.
Integrity
This is about making sure that information is accurate and can be trusted. We don’t want it to be changed without permission, so we use something called integrity controls like hashing or checksums to check if the information has been modified. We can also use access controls to limit who can change the information. The goal is to make sure the information is consistent and reliable.
Availability
Availability means that information should be easy to get to when we need it. The IT department is responsible for making sure the systems that store information are always working properly. If something goes wrong, like a power outage or a hard drive failure, we might not be able to access the information. Another problem is when hackers try to block access to a website, which is called a Denial-of-Service attack. The goal is to make sure the information is always available and ready to use.
Non-repudiation
Non-repudiation means that no one can deny doing something because there is proof that it happened. This is important for things like sending emails or ordering goods online. Without non-repudiation, people could deny doing things and it would be difficult to prove otherwise.
Authenticity
This is about being able to prove where something came from and that the party who sent it cannot deny it. (Proof of origin)
This is closely related to non-repudiation.
Assets
An asset is something valuable to the organization, it can be physical like a building or something intangible like information or reputation. For example, assets of a business include people, buildings, computer systems, information, reputation, and brand.