Securing Your Computer After a Major Security Incident

Page 1

Securing Your Computer After a Major Security Incident


Introduction The business value of information has increased dramatically over the last few decades. Information systems have pervaded the business world in a rapid pace and have become critical assets in many organisations. Many organisations have become largely dependent on information and information systems to support their core business processes. Unfortunately, many threats to information and information systems exist today, which threaten the reliability of information (systems) and consequently business continuity.


Introduction -


Aspects of information security Reliability aspects of information security - Basically, information security deals with protecting three different “reliability” aspects of information: confidentiality, integrity and availability, which can be remembered by the mnemonic “CIA” and are frequently referred to as the CIA triad [PELT05]. These three widely accepted attributes of information security are stated below. Confidentiality - Confidentiality is the concealment of information or resources and is defined by ISO-17799 as “ensuring that information is accessible only to those authorised to have access to it.” So, to attain confidentiality, a business needs to keep secret information secret. This also means that only certain people should know about the existence of certain information in the first place, on a need to know basis.


Aspects of information security Integrity Integrity -- Integrity Integrity refers refers to to the the trustworthiness trustworthiness of of information information or or resources resources and and is is defined defined by by the the ISO-17799 ISO-17799 standard standard as as “the “the action action of of safeguarding safeguarding the the accuracy accuracy and and completeness completeness of of information information and and processing processing methods.” methods.” When When aa user user requests requests any any type type of of information information from from the the system, system, the the information information will will be be complete, complete, correct correct and and up up to to date. date. Availability Availability -- ISO-17799 ISO-17799 defines defines availability availability as as “ensuring “ensuring that that authorised authorised users users have have access access to to information information and and associated associated assets assets when when required.” required.” Availability Availability requires requires measures measures to to ensure ensure timeliness timeliness and and continuity continuity of of information, information, so so that that business business processes processes don’t don’t come come to to aa halt. halt.


Security controls from threat to recovery -


Defining security incidents Without threats ever materialising and vulnerabilities ever being exploited, there would not be any security incident. However, this is clearly not the case: security incidents occur frequently within organisations. Results from a survey by the ISF show that incidents erode companies’ profits, depress the value of the business and compromise future earnings


Information security incidents -


ISF information security incident management Recently, in April 2006, the ISF publicised a report containing the results of a study on information security incident management, which yielded a process for information security incident management. The first three stages of that process, namely Identification, Response and Recovery, consist of steps specific to minimising the impact of and resolving an information security incident. The final stage, Post-incident review, involves follow-up activities which relate to the information security incident. It must be noted that the stages of the information security incident management process, and the steps contained within those stages, are not necessarily fully sequential.


ISF information security incident management -


Cyberspace -

A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the internet, telecommunications networks, computer systems, and embedded processors and controllers.


Life in a Networked World -

Rapid development in information technology –  Speed of microprocessor chips doubles every 12-18 months  Storage density doubles every 12 months  Bandwidth is doubling every 12 months  Price keeps dropping making technology affordable & pervasive



Thank you for watching this site Click here to install Webroot setup http://webroot-com-safes.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.