< Previous Lesson Lesson Plan Next Lesson >

Security of Information Systems

In the modern digital environment, information systems are critical to organizational success, yet they are inherently vulnerable to threats such as unauthorized modification, intrusion, misuse, and system malfunction. As organizations increasingly rely on computerized systems to store, process, and transmit data, ensuring robust information system security has become a strategic and operational necessity rather than a purely technical concern.

Information systems must therefore be protected through well-designed and continuously evolving security mechanisms. In practical terms, information assets are considered secure when the expected losses arising from potential threats over a defined period are maintained at an acceptable level. Absolute security is neither feasible nor economically justified; instead, organizations aim to manage risk within tolerable limits.

28.1 Security Issues in Information Systems

Some degree of loss is inevitable in all organizational environments. Attempting to eliminate every possible loss is either technically impossible or prohibitively expensive. Consequently, management must define acceptable levels of risk and link them to a time horizon over which such losses can be tolerated.

Threats to information systems generally fall into two broad categories:

Examples of Intrusion

Intrusion may involve attempts to gain unauthorized access to sensitive systems, such as a bank’s financial platform, to execute fraudulent transactions. In other cases, the intent may be limited to stealing customer data, intellectual property, or confidential business information for personal or competitive advantage.

Not all threats originate externally. Insider threats pose a significant risk, particularly when employees with authorized access misuse their privileges. For example, an employee leaving an organization may attempt to manipulate or extract data unless appropriate controls are in place.

Management’s Responsibility for Information Security

Executive management bears ultimate responsibility for ensuring a secure information systems environment. Senior leadership must actively sponsor and promote information security initiatives, demonstrating their importance across the organization.

When security is visibly supported by top management, employees and system users are more likely to recognize its significance and comply with established controls. Security, therefore, should be embedded into organizational culture rather than treated as an isolated technical function.

Importance of Information System Security

Sound information system security is fundamental to building trust among stakeholders, ensuring business continuity, and protecting organizational reputation. As reliance on digital systems grows, security is universally recognized as a pervasive and critically important quality attribute.

Organizations must protect themselves against the risks inherent in using information systems while simultaneously leveraging the benefits they provide. Effective security enables innovation, operational efficiency, and regulatory compliance without exposing the organization to unacceptable risk.

28.2 Security Objectives

In 1992, the Organization for Economic Cooperation and Development (OECD) issued its Guidelines for the Security of Information Systems, defining the primary objective of information security as:

“The protection of the interests of those relying on information, and the information systems and communications that deliver the information, from harm resulting from failures of availability, confidentiality, and integrity.”

This objective is commonly expressed through the CIA triad:

The relative importance of availability, confidentiality, and integrity varies depending on the nature of the information and the business context in which it is used. For example, availability may be critical for operational systems, while confidentiality may take precedence for personal or financial data.

28.3 Scope of Information System Security

The concept of security applies to all forms of information, regardless of how they are recorded, processed, stored, transmitted, or retrieved. Security focuses on protecting valuable information assets against loss, unauthorized disclosure, damage, or misuse.

Information assets include data stored in databases, files exchanged across networks, backups, reports, application software, and even encoded or transformed data. For example, when organizations exchange encoded data, tools such as a Base64 encoder and decoder may be used for data transformation, highlighting the need to secure information at every stage of its lifecycle.

These assets must be protected from threats that could render them inaccessible, inaccurate, altered, or wrongfully disclosed.

Types of Information Assets

In manual systems, physical records are the primary assets requiring protection. In computerized environments, however, the sensitivity and value of information are significantly enhanced. Information assets typically include:

28.4 Security Policy

Organizations committed to protecting their information assets must establish a formal security policy. This policy should be clearly documented and communicated to all employees, contractors, and other stakeholders. It should also align with and support existing organizational policies and strategic objectives.

At its core, a security policy must acknowledge the value of information and the organization’s dependence on reliable and secure information systems.

Contents of a Security Policy

A comprehensive security policy is a critical governance document and typically includes:

28.5 Security Program

A security policy is typically developed and maintained through a structured security program or security review. A security program consists of ongoing and periodic assessments designed to ensure that information system assets are adequately safeguarded.

The initial security review is often a comprehensive and resource-intensive exercise, forming the foundation for future security improvements.

Conducting a Security Program

Preparation of the Project Plan

The first step in a security program is the preparation of a detailed project plan. This plan defines the objectives, scope, and boundaries of the review to prevent unnecessary effort and ensure meaningful outcomes.

Major Components of the Project Plan

28.6 Identification and Ranking of Assets

Identifying information assets is a fundamental step in determining what must be protected. Without a clear understanding of assets, it is difficult to assess risks or design effective controls.

Ranking of Assets

Once identified, assets should be ranked based on their importance and criticality to the organization. Key considerations include:

Threat Identification

A threat is any action or event that can lead to a loss. During this phase, organizations identify all potential threats that could expose, damage, destroy, or misuse information assets. Understanding these threats enables organizations to design proportionate and effective security controls.

Through systematic asset identification, threat analysis, and ongoing security programs, organizations can establish a resilient information system security framework that supports business objectives while managing risk effectively.

< Previous Lesson Lesson Plan Next Lesson >