Human-Technology Centric in Cy
Human-Technology Centric in Cy
Human-Technology Centric in Cy
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
Introduction
The development of Information Communication Technology (ICT) infrastructure had growth
which is very fast in producing a wide range of computer products cause some medium sized
organizations are confused and ambiguous as to what should be done to the ICT infrastructure.
This resulted in tragedy 'white elephant' where infrastructure is purchased by the organization
were not fully utilized or not used at all especially for ICT security infrastructure. This ambiguity
is likely due to the lack of control or it does not give the impression and clear benefits to
business activities and organizational management.
Thus, the ICT infrastructure needs of a medium-sized organizations will be discussed to
overcome this problem is not clear. Plans are made to the infrastructure of ICT is not simply to
facilitate commerce and organization but it must be in line with the mission and objectives of the
organization.
Such planning should be in terms of ICT needs of an organization. Next, it seeks to be
implemented and operated well for the success of an organization, whether it is for profit or social
based service.
ICT security maintenance is very important aspect in ICT infrastructure to identify any
weaknesses which involved security breach in the some organizations at early time. At the same
time, some key concerns have also emerged about security maintenance in IT services and
infrastructure, which currently are viewed as significant barriers to its fast and wide-spread
adoption. According to an IDC survey of CIOs consecutively in 2008 and 2009, security,
integration and reliable performance ranked among the top concerns expressed [1].
An ENISA (European Network and Security Administration) survey of Small and Medium
Business (SMBs) also confirms that major concerns for SMBs migrating to the ICT service or
infrastructure include the confidentiality of their information and liability for incidents involving
the infrastructure [2]. This is understandable, because each of these factors have a major influence
on the enterprises bottom-line.
Similarly, availability of the ICT services platform with good performance and depends heavily
on the quality of network characteristics, especially the round trip delay or latency [1]. Security
is a key concern, because confidentiality, integrity, authenticity and auditability of business data,
tools and transactions are critical requirements for businesses to stay functional, legal and
competitive. This need is especially critical for all users especially for overall security
maintenance in IT service and infrastructure.
2
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
Accounting management functions in ISO network management model is the process to use
in measuring network utilization parameters so that individual or group users on the network can
be regulated appropriately for the purposes of accounting or chargeback. Same as the
performance management, the first step toward appropriate accounting management is to
measure the utilization of all important network resources. This aspect of network management
usually focusing on Internet service providers to bill customers for the resources they use.
Fault management in ISO network management model is similar on what most people think
that the administration thinks to manage the network. The goal of this network management
functional is to identify, detect and alert system administrators of problems that may affect the
system operations. Then, it needs to fix network problems primely in automatically to keep the
network running effectively. Any faults can cause downtime or unacceptable network
degradation, fault management is perhaps the most widely implemented of the ISO network
management.
The goal of security management ISO network management model is to control access to
network resources according to local guidelines so that the network cannot be sabotaged whether
in intentionally or unintentionally. Implementation of security management subsystem it seems
like, can monitor users logging on to a network resource, refusing access to those who enter
inappropriate access codes. Security management deals with controlling access to resources.
Then, notify the competent authorities if some resources are available. Similarly like a network
operator or e-mail outsourcing, if a resource fails, management systems can be used to access the
network to send messages when certain files or routers, servers.
It security management
The definition of Information Security based on ISO/IEC 17799:2005 is “preservation of
confidentiality, integrity and availability of information, in addition, other properties such as
authenticity, accountability, non-repudiation and reliability can also be involved”.
Information has many definitions as follows:
i) Information is about someone or something consists of facts about them.
ii) Important or useful facts can be obtained as output from a computer by means of
processing input data with a program.
iii) Information is an asset which is like other important business assets which is has value to
an organization and consequently needs to be suitably protected [3].
iv) Information can exist in many forms. It can be printed or written on paper, stored
electronically, transmitted by post or using electronic means, shown on films or spoken
in conversation.
The core elements of information security management are to ensure the information assets,
namely the following aspects.
i) Confidentiality
ii) Integrity
iii) Availability
Confidentiality is the property that information is not made available or disclosed to
unauthorized individuals, entities, or processes [4]. Some examples of breach of confidentiality
are “Unauthorized personnel can read the classified documents”, “Remote access to the system
without approval”, and “Shared folders without consent of the owners”.
Integrity separates into data integrity and system integrity [5]. Data integrity means the
property that data has not been altered or destroyed in an unauthorized manner [6]. System
integrity means the property that a system performs its intended function in an unimpaired
manner, free from deliberate or accidental unauthorized manipulation of the system [7].
3
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
The definition of Availability is the property of being accessible and usable upon demand is
obtainable from an authorized entity.
4
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
• External monitoring
• Internal monitoring
• Planning and risk assessment
• Vulnerability assessment and remediation
• Readiness and review
2. Threat in the cyber world is anything that can be interferes with the operation, function,
integrity, availability of all types of IT infrastructure and services. Threats can be occur in any
type of form. Threats can be happen as an evil action by those who are not responsible or by
accident due to natural events or human errors.
3. Attack is the particular technique used to exploit the existing weaknesses that occur in
information technology infrastructure [14]. For an example is a type of threat as a denial of
service or DoS. Actually, this weakness exists in the design of operating systems and a type
of attack that can be done due to the weaknesses is an attack called Ping of Death attacks.
There are two main categories of attack which is passive attack or active attack.
5
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
6
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
As a pioneer, UK Department of Trade & Industry (DTI) firstly developed Code of Practice
(CoP) PD0003 on information security in September 1993, with the assistance of a group of
leading UK organizations. This Code of Practice was later retitled and published as BS 7799 Part
1 “Code of Practice for Information Security Management” in February 1995 by British
Standards Institution (BSI). BS 7799 provides a common basis for developing organizational
security standards and effective information security management practices. It enhances
confidence in inter-organizational dealings.
Then, a new standard BS 7799 Part 2 “Information Security Management System –
Specification with guidance for use” was released in 1998. The structure of this standard was the
same as Part 1, in addition to defining a Code of Practice based on a set of key controls. As BS
7799 was a theoretical control standard and not a technical standard of practice, it might not
solve ISMS problems effectively. Therefore, ISO further developed ISO/TR 13335 (Information
Technology – Guideline for the Management of IT Security) and ISO/IEC 18044 (Information
Security Incident Management) standards (ISO/IEC FDIS 17799:2005; ISO/IEC 27001:2005
[15]. Both standards are helping ICT industry to implement information security management.
A scheme for accreditation of BS 7799 entitled “c:cure” was launched at InfoSecurity 1998
by UK Accreditation Certification Service (UKAS) and the British Standards Institution (BSI).
The accreditation procedure for ISO 9001 was adopted such as independent accredited
certification body required for the purpose. This scheme initiated the further adaptation from
national standard (BS) to international standard (ISO). Following the revisions of BS 7799 part 1
in 1999, the standard was transferred to ISO/IEC 17799:2000 (Part 1) – Code of Practice for
Information Security Management. Finally, ISO/IEC 27001 Part 1 and Part 2 were issued in
2005, making them official and recognized standards both locally and internationally [16].
ISO/IEC 27001:2005 is directly related to the original BS 7799.
ISO/IEC 27002:2005 is a generic and advisory document, not a formal specification standard.
It provides a well-structured and comprehensive set of controls to address information security
risks, covering confidentiality, integrity and availability aspects [17]. Organizations that adopt
ISO/IEC 27002 must assess their own information security risks and apply suitable controls, by
following the standard for guidance.
ISO 27001
ISO 27001 is an International Standard which specifies the requirements for establishing,
implementing, operating, monitoring, reviewing, maintaining and improving a documented
Information Security Management System (ISMS) of an organization’s overall business risks.
ISMS is designed to ensure the selection of security controls is adequate and proportionate so as
to protect information assets of the organization and give confidence to their customers.
The international standard ISO/IEC 27001:2005 has its roots in the technical content derived
from BSI standard BS7799 Part 2:2002. This standard is generally applicable to all types of
organizations, including business, enterprises, government agencies, institution, healthcare and
so on.
The standard introduces a cyclic model known as the “Plan-Do-Check-Act” (PDCA) model
that aims to establish, implement, monitor and improve the effectiveness of an organization’s
ISMS. The PDCA cycle has four phases:
1. Plan – Establishment of the ISMS. The first step is to define risk assessment, in which
risks shall be identified, analyzed and evaluated. Identification and evaluation of the risk
treatment options are then followed. After the control objectives and controls are selected,
management needs to approve residual risks and authorize implementation of ISMS.
2. Do – Implementation and operating the ISMS. Management actions, resources,
priorities, roles and responsibilities shall be defined in this step. It needs to determine the risk
treatment plan to the respective risks, and to implement controls accordingly.
7
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
3. Check – Monitoring and reviewing the ISMS. Monitoring and reviewing procedures
should be developed and executed. The effectiveness of ISMS and controls, as well as the risk
assessment methodology and residual risks, should be included and reviewed.
4. Act – Maintaining and improving the ISMS. Implementing both preventive and
corrective actions in this step could further improve the ISMS. It also enforces document and
record control, and reviews information security incidents for lessons learning, so as to
improve the ISMS.
Often, ISO/IEC 27001:2005 is implemented together with ISO/IEC 27002:2005. ISO/IEC
27001 and ISO/IEC 27002 assist in defining the requirements and outlining the most suitable
information security controls for the ISMS respectively. However, no guidelines of risk
assessment mechanism and ISMS implementation are included; those standards are only stated
what is needed to do but it does not mention how to do.
ISO/IEC 13335 was initially a Technical Report (TR) before becoming a full ISO/IEC
standard. It consists of a series of guidelines for technical security control measures:
1. ISO/IEC 13335-1:2004 documents the concepts and models for information and
communications technology security management.
8
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
9
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
Conclusion
After review of information security management, this provides foundation knowledge and
supporting evidences to develop a security maintenance model for ICT infrastructure. The
development on Information Security Management System (ISMS) had a long development
history in any organization and low adoption of ISO 27001 was observed [23]. The high costs in
money and time of ISMS implementation are definite barriers for smaller size companies to
adopt the standard.
Therefore, a security maintenance model for ICT infrastructure based on putting the core and
compatible requirements of ISO 27001 ISMS for reducing the redundancy of the existing usage
of ICT security safeguards and aimed to reduce domain’s barriers [24]. The development of a
security maintenance model for ICT infrastructure is proposed as a common framework and
overcome the limitations of integrated system theory, as well as adopting the key concepts from
IT security model.
Moreover, the PDCA approach was observed in ISO 27001 ISMS model. Combination of all
the advantages in each model as example like understanding customer requirements, value-added
processes, processes performance and effectiveness, continually improvement and others to
develop the security maintenance model for ICT infrastructure.
A review on different approaches of IT security management model was performed such as
ISO/IEC 27005:2008 and PDCA framework. This is combined with PDCA and IT security
management model to fulfill ISO 27001:2005 standard. Lastly, the different implementation
models for ISMS and IT security management model had reviewed.
Actually, a novel conceptual framework of the security maintenance had proposed to make
any IT infrastructures and services that follow those guidelines will accessible properly and
secure by any authorized peoples. However, there are no security aspects had been discuss in
10
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
details for IT services and infrastructure’s maintenance. Then, the documentation had been
provided as a manual access which is needs to follow the guidelines.
Now days, security should be concern in any IT services and infrastructures including in any
proposed maintenance model and guidelines. Then, its need overall coverage to make the
guidelines become more effective and easy to use. Security maintenance is more important in
cyber space for any organizations especially for IT services and infrastructure usage in safe and
secure manner.
Acknowledgment
Thanks for the Universiti Tun Hussein Onn Malaysia on the supporting to this paper and make
it available in the proceeding.
References
[1] J. Fonseca, M. Vieira and H. Madeira, "Evaluation of Web Security Mechanisms using
Vulnerability and Attack Injection," IEEE Transactions on Dependable and Secure
Computing, vol. PP, no. 99, pp. 1-1, 2013.
[2] Wooyun. wooyun, <http://www.wooyun.org/> [accessed 01.05.15].
[3] C. Melara, J.M. Sarriegui, J.J. Gonzalez, A. Sawicka, D.L. Cooke, A system dynamics
model of an insider attack on an information system, in: J.J. Gonzalez (Ed.), From Modeling
to Managing Security: a System Dynamics Approach, Norwegian Academic Press,
Kristiansand, Norway, 2003, pp. 9–36.
[4] C.E. Landwehr, Formal models for computer security, ACM Comput. Surv. 13, 1981, pp.
247–278.
[5] 360. Butian, <http://loudong.360.cn/> [accessed 01.05.15]
[6] D.L. Nazareth, J. Choi, Information security management: a system dynamics approach,
Eighteenth Americas Conference on Information Systems (AMCIS- 2012), Seattle, WA,
2012, Paper 3.
[7] D. Trcek, Using system dynamics for managing risks in information systems, WSEAS
Trans. Inf. Sci. Appl. 2, 2008, pp. 175–180.
[8] M.E. Whitman, H.J. Mattord, Principles of Information Security, fourth ed., Course
Technology, Boston, MA, 2014.
[9] M.A. Alnatheer, A conceptual model to understand information security culture, Int. J. Soc.
Sci. Hum. 4, 2014, pp. 104–107.
[10] J. May, Analyzing the socio-organizational constructs for IS security within organizations,
in: S. Furnell, P. Dowland (Eds.), in: Proceedings of the 11th IFIP TC11. 1 Working
Conference on Information Security Management, Richmond, VA, 2008, pp. 103–118.
[11] K.H. Guo, Y. Yuan, The effects of multilevel sanctions on information security violations: a
mediating model, Inf. Manage. 49, 2012, pp. 320–326.
[12] A. Simmonds, P. Sandilands, L.v. Ekert, An ontology for network security attacks, in: S.
Manandhar, J. Austin, U. Desai, Y. Oyanagi, A. Talukder (Eds.), Applied Computing,
Springer, Berlin, 2004, pp. 317–323.
[13] D. Trcek, Security models: refocusing on the human factor, Computer 39, 2006, pp. 103–
104.
[14] M.d. Vivo, G.O.d. Vivo, G. Isern, Internet security attacks at the basic levels, ACM SIGOPS
Oper. Syst. Rev. 32, 1998, pp. 4–15.
[15] ISO/IEC 17799 (2005), Information Technology – Security Techniques – Code of Practice
for Information Services, International Organization for Standardization, Geneva.
11
1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1018 (2018)
1234567890 ‘’“” 012012 doi:10.1088/1742-6596/1018/1/012012
[16] ISO/IEC 17799 (2005), Information Technology – Security Techniques – Code of Practice
for Information Services, International Organization for Standardization,
Geneva.
[17] ISO/IEC 27001 (2005), Information Technology – Security Techniques – Information
Security Management System – Requirements, International Organization for
Standardization, Geneva.
[18] ISO/IEC 27002 (2005), Information Technology – Security Techniques – Code of Practice
for Information Services, International Organization for Standardization, Geneva.
[19] Tripathi A, Singh UK. Taxonomic analysis of classification schemes in vulnerability
databases. In: Computer sciences and convergence information technology (ICCIT), 2011 6th
international conference on. IEEE; 2011. p. 686–91.
[20] US-CERT. Common vulnerabilities and exposures (cve), <https://cve.mitre.org/> [accessed
01.05.15].
[21] A. Hovav, J. D’Arcy, Applying an extended model of deterrence across cultures: an
investigation of information systems misuse in the U.S. and South Korea, Inf. Manage. 49,
2012, pp. 99–110.
[22] S.-C. Yang, Y.-L. Wang, Insider threat analysis of case based system dynamics, Adv.
Comput. 2, 2011, pp. 1–17.
[23] A.C. Kim, S.M. Lee, D.H. Lee, Compliance risk assessment measures of financial
information security using system dynamics, Int. J. Secur. Appl. 6, 2012, pp. 191–200.
[24] A. Vance, M. Siponen, S. Pahnila, Motivating IS security compliance: insights from habit
and protection motivation theory, Inf. Manage. 49, 2012, pp. 190–198.
12
Reproduced with permission of copyright owner. Further reproduction
prohibited without permission.