{"id":64,"date":"2007-06-04T23:17:00","date_gmt":"2007-06-04T23:17:00","guid":{"rendered":"http:\/\/mayanktrivedi.net\/technotes\/2007\/06\/04\/driving-factors-for-information-security\/"},"modified":"2022-04-06T20:23:49","modified_gmt":"2022-04-06T20:23:49","slug":"driving-factors-for-information-security","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2007\/06\/04\/driving-factors-for-information-security\/","title":{"rendered":"Driving Factors for Information Security"},"content":{"rendered":"<div>\n<p><span style=\"font-size:100%;\"><a name=\"_Toc162434571\"><span style=\"font-family:Verdana;\">Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security &#8211; <o:p><\/o:p><\/span><\/a><\/span><\/p>\n<h3 style=\"margin-left: 0.75in; text-align: left; text-indent: -0.75in; line-height: 14pt;\" align=\"left\"><span style=\"font-size:130%;\"><b><span style=\"font-family:Verdana;\"><span lang=\"EN-IN\">Information Security Threats and Risks<\/span><\/span><\/b><\/span><span lang=\"EN-IN\"><o:p><\/o:p><\/span><\/h3>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Any information system usage or implementation may be a target for range of serious threats, including computer based fraud, espionage, sabotage, vandalism and other forms of systems failure or disaster. This may result in risk of data loss from accidental\/malafide unauthorized access, use, misappropriation, modification or destruction of information and information systems.<o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Moreover, sharing of information for business reasons using new applications and inter-connected resources increases the threat of information pilferage. Ensuring security of business critical information is important for Organization maintain competitive advantage in the marketplace. In the course of conducting business, any such information must be shared hundreds, even thousands of times each day. Designing, building, marketing and selling products requires discussing, faxing, e-mailing or otherwise sharing sensitive, proprietary information.  Each time such information is shared, it is further exposed to the risk of being lost or compromised. Each conduit for information sharing presents opportunities to unauthorized persons to attempt to acquire such information. <o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Inconsistent policies for assigning system usage may also result in access rights to information and information systems exceeding the needs of employees\u2019 job responsibility. While the number of users accessing information systems are increasing, the control exercised by the system owners or provider is being dissipated.<o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\"><span style=\"font-size:100%;\">While technological advancement has provided significant benefits, it has also equipped malicious users with more advanced means and tools to obtain unauthorized access to data\/information. With the availability of Internet, there is an increasing risk that these tools are freely available.<\/span><o:p><\/o:p><\/span><\/span><\/p>\n<h3 style=\"margin-left: 0.75in; text-align: left; text-indent: -0.75in; line-height: 14pt;\" align=\"left\"><span style=\"font-size:130%;\"><a name=\"_Toc162434572\"><b><span style=\"font-family:Verdana;\"><span lang=\"EN-IN\">Legal and Statutory Requirements<\/span><\/span><\/b><\/a><\/span><span lang=\"EN-IN\"><o:p><\/o:p><\/span><\/h3>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Security requirements also arise from and are subject to the statutory and contractual requirements of Organization, its service providers and third parties.  Information Security Department will also ensure that the security policies factor account these requirements as well.<o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\">(The <st1:place st=\"on\"><st1:country-region st=\"on\">U.S.<\/st1:country-region><\/st1:place> government has created new laws that specifically address Information Age misconduct; Sarbanes Oxley Act, GLBA and HIPAA are the mentionable names in this aspect. In <st1:place st=\"on\"><st1:country-region st=\"on\">India<\/st1:country-region><\/st1:place> too initiatives have been taken in this regard and \u201cIndian Information Technology Act 2000\u201d has been rolled out. More is expected to fall in place as the Government and Industry consortium is working in Unison to create much awaited infrastructure for secure organizational practices.)<o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Apart from the laws, there are the internationally acclaimed best practices and the standards that have evolved. 27001, ISO\/IEC 17799; 21827; 15408 etc from ISO, CoBit, COSO, SAS 70 etc are few of such standards where the organizations are seeking compliance for the Security Practices and Operations. <o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\">But beyond these laws, best practices and standards, organizations need to know how to create a system and a culture that will not be susceptible to this type of illegal behavior.<\/span><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\";font-family:&quot;;\" > <\/span><\/span><span style=\"font-size:100%;\">It\u2019s a good practice to put some basic policies and guidelines in place and share it with the associates, consultants, customers &#038; vendors.<\/span> <o:p><\/o:p><\/p>\n<h3 style=\"margin-left: 0.75in; text-align: left; text-indent: -0.75in; line-height: 14pt;\" align=\"left\"><span style=\"font-size:130%;\"><a name=\"_Toc162434573\"><b><span style=\"font-family:Verdana;\"><span lang=\"EN-IN\">Gaining User Support<\/span><\/span><\/b><\/a><\/span><span lang=\"EN-IN\"><o:p><\/o:p><\/span><\/h3>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\"><span style=\"font-size:100%;\">It is also necessary to ensure adequate IT control environment to minimize the risk of any negative incidents involving computers.  This assumes significance in view of the rapid strides that Organization has achieved in adopting newer technologies.  The end-user confidence and support is one of the fundamental building block for deriving full benefits of IT resources.<\/span><o:p><\/o:p><\/span><\/span><\/p>\n<h3 style=\"margin-left: 0.75in; text-align: left; text-indent: -0.75in; line-height: 14pt;\" align=\"left\"><span style=\"font-size:130%;\"><a name=\"_Toc162434574\"><b><span style=\"font-family:Verdana;\"><span lang=\"EN-IN\">Building Customer Confidence<\/span><\/span><\/b><\/a><\/span><span lang=\"EN-IN\"><o:p><\/o:p><\/span><\/h3>\n<p><span style=\"font-family:Verdana;font-size:100%;\">Customers must have confidence that information systems will operate as intended without unanticipated failures or problems.  Otherwise, the systems and its underlying technologies may not be utilized to its optimum level and further growth and innovation may be inhibited.  <o:p><\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><o:p> <\/o:p><\/span><\/p>\n<p><span style=\"font-family:Verdana;font-size:85%;\"><span style=\"font-size:10;\"><span style=\"font-size:100%;\">Any views?<\/span><o:p><\/o:p><\/span><\/span><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security &#8211; Information Security Threats and Risks Any information system usage or implementation may be a target for range of serious threats, including &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,31,78],"tags":[],"class_list":["post-64","post","type-post","status-publish","format-standard","hentry","category-information-security","category-information-security-risks","category-information-security-threats","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":205,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/64\/revisions\/205"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}