Information Security
What is information security and why is it important?
In the days when most business information was paper-based, it was generally sufficient to keep confidential information in a locked filing cabinet, employ trustworthy staff and use security personnel to monitor your premises at night and weekends.
In today's electronic world it is easy to fall into the trap of thinking that a similar approach is still good enough. But the media's almost-daily reports of IT-related security breaches show us that it is not.
PCs, laptops, mobile phones, the internet and e-commerce have all brought major advances to how we do business. But they are also potential risks to the security of the information which they store or communicate.
Information security is concerned with:
|
confidentiality: making sure that information is available only to those who have a legitimate need or right to access it |
|
integrity: safeguarding the accuracy and completeness of information, so that a recipient can be sure that information received has not been altered during transmission |
|
availability: ensuring that legitimate users of information have access to it when required |
The solution
There is plenty of technology around designed to protect electronic information (virus checkers, encryption, firewalls, data back-up tools, passwords etc).
But how do you know whether it is being applied correctly and that it works effectively? This is a management rather than a technical issue. For example, access to an organisation's computer systems is normally controlled by user name and password. However this is pointless if a staff member chooses a password which is easily guessed or keeps a note of it on a pad next to the PC.
Security needs to be part of everyone's everyday thinking, just like quality. The way to achieve this is to include information security within the scope of the organisation's overall management system.
The approach
An information security management system should be developed using a risk-based approach. Part 1 of the British Standard, 'Information security management' ISO 17799 / BS 7799, provides comprehensive coverage of contemporary security controls. Identifying the threats to the organisation's information assets and the associated risks enables the organisation to select which controls are applicable and how they need to be applied.
This is known as a Risk Assessment, which is a key component of an information security management system.
Click here to find out more about BS 7799 / ISO 17799 / ISO 27001
|
Username and password required. If you have forgotten your password or you haven't used the site before, please contact us. |
Back to top