2 THE PATTERNS BUILD-UP
2.1 The Actual Scope
The first achievement that the management of
information security outlined was the key
characteristic of information that make it valuable to
an organisation.
The C.I.A. triangle (Confidentiality, Integrity,
Availability) has been industry standard for
computer security since the development of the
mainframe.
The components of the C.I.A. were defined as
follows (E-Government Act of 2002):
“Confidentiality, the preservation of authorized
restrictions on access and disclosure, including
means for protecting personal privacy and
proprietary information;
Integrity, guarding against improper information
modification or destruction, which includes ensuring
information non repudiation and authenticity;
Availability The property of ensuring timely and
reliable access to and use of information.”
Threats to these three characteristics of
information have evolved into a vast collection of
potential danger, including accidental or intentional
damage, destruction, theft, unintended or
unauthorized modification, or the misuses from
human or other threats (WHITMAN p. 6)
The new environment of constantly evolving
threats has necessitated the development of a more
robust model of the characteristic of information.
The C.I.A triangle has expanded into a more critical
list of information: privacy, identification,
authentication, authorization.
The concept of computer security has been
replaced by the concept of information security that
is achieved via many routes, with several approaches
usually undertaken singly or used in combination
with one another.
Furthermore the approaches should be integrated
with the specialize areas of security include the
following: physical security, personal security,
operations security, communications and network
security.
From a managerial perspective each must be
properly planned, organized, staffed, directed and
controlled.
Organizations have the option of performing a
risk assessment in one or two ways: qualitatively or
quantitatively. Qualitative risk assessment produce
valid results that are descriptive versus measurable.
The quantitative risk assessment is used by an
organization when it becomes more sophisticated in
data collection and retention and staff become more
experienced in conducting risk assessment.
The hallmark of a quantitative risk assessment is
the numeric nature of analysis. Frequency,
probability, impact, countermeasures effectiveness,
and other aspects of the risk assessment have a
discrete mathematical value in pure quantitative
analysis.
In that case the definition of risk, is assumed as
“combination of the probability of an event and its
consequences, but the term risk is generally used
only when there is at least the possibility of negative
consequences.” (ISO/IEC Guide 73, p. 2)
The consequent step of risk management is its
reduction within levels of acceptance introducing
safeguards that reduce the rate of the product
probability by consequences, where both the terms
are included under an ordered category.
However the increasing dependence of the
human activities from the ISs make more and more
difficult the estimation of a given risk by the
traditional statistical and /or analytical model (RSSG
p. 4).
The top edge of security management is
represented by the International Standard, that has
been prepared to provide a model for establishing,
implementing, operating, monitoring, reviewing,
maintaining and improving an Information Security
Management System (ISO/IEC 27001 p. v–vi).
The International Standard adopts the “Plan–Do-
Check–Act” (PDCA) model which is applied to
structure all ISMS process as it’s shown in figure 1.
The frontiers in IS security management is to
look at the organization itself and identify what
needs to be protected, to determine what is the risk,
and to develop solutions requiring both technology
and practise based solutions.
The International standard is aligned with related
management standards and represents a core
reference for quality assurance auditors of Security
Management.
However all the current methods of security
management based on quantitative analysis of risk
are “bottom up”:
They start with the computing infrastructure and
focuses on the technological vulnerabilities, without
the non complete capacity of considering the risks to
the organizations missions and business objective.
The first element of inadequacy should be
individuated in the absence of a proper model that
can fully describe the relationship between threats
and countermeasures or in other words the
THE PATTERNS FOR INFORMATION SYSTEM SECURITY
343