C H A P T E R 1
Information Security Essentials for IT
Managers: Protecting Mission-Critical
Systems
Albert Caballero
Terremark Worldwide, Inc.
Information security involves the protection of organizational assets from the disruption
of business operations, modification of sensitive data, or disclosure of proprietary
information. The protection of this data is usually described as maintaining the
confidentiality, integrity, and availability (CIA) of the organization’s assets, operations,
and information.
1. Information Security Essentials for IT Managers, Overview
Information security management as a field is ever increasing in demand and responsibility
because most organizations spend increasingly larger percentages of their IT budgets in
attempting to manage risk and mitigate intrusions, not to mention the trend in many
enterprises of moving all IT operations to an Internet-connected infrastructure, known as
enterprise cloud computing [1]. For information security managers, it is crucial to maintain a
clear perspective of all the areas of business that require protection. Through collaboration
with all business units, security managers must work security into the processes of all
aspects
of the organization, from employee training to research and development. Security is not an
IT problem; it is a business problem.
Information security means protecting information and information systems from unautho-
rized access, use, disclosure, disruption, modification, or destruction [2].
Scope of Information Security Management
Information security is a business problem in the sense that the entire organization must
frame and solve security problems based on its own strategic drivers, not solely on technical
controls aimed to mitigate one type of attack. As identified throughout this chapter,
security
1
Visibility
increases
Level 1:
Level 2:
Level 3:
Level 4:
Level 5:
Sophistication
increases
Definite
security
Comprehensive security
awareness
Back-end
system security
Front-end system security
Physical and environmental security
Prevention
...
Detection
...
Recovery
Figure 1.2: ISMM framework [9].
Physical aspects
Security
policy
Organizational
security
Compliance
Personal security
System
development
and maintenance
Communications and
operations
management
Business continuity
management
Physical
and environmental
security
Access control
Asset
classification
and control
Technical
aspects
Organizational
aspects
Figure 1.1: ISO 17799:2005 security model [8].
www.syngress.com
Information Security Essentials for IT Managers: Protecting Mission-Critical Systems
3