2.1 Need For Security
2.1 Need For Security
2.1 Need For Security
Class: Batch:
Course code: Course Title:
Security Investigation: Need for Security – Business Needs – Threats – Attacks – Legal, Ethical
and Professional Issues in Information Security – Selecting Risk Control Strategy – Risk
Management – Recom mended Risk Control Practices.
Security investigation means the investigative procedures conducted by the competent authority of a
Member State in accordance with its national law and regulations in order to obtain an assurance that
nothing adverse is known which would prevent an individual from being granted a security clearance up
to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or higher).
Types of Security:
Physical security-Physical security refers to measures that protect physical assets, such as
buildings, property, and people. This can include things like locks, cameras, alarms, and guards.
Personal security-Personal security refers to measures that protect individuals, such as self-
defense training and personal alarm systems.
Criminal investigations are conducted by law enforcement agencies and are used to gather
evidence in criminal cases.
The purpose of information security management is to ensure business continuity and reduce business
damage by preventing and minimizing the impact of security incidents. The Audit Commission Update
report (1998) shows that fraud or cases of IT abuse often occur due to the absence of basic controls,
with one half of all detected frauds found by accident. An Information Security Management System
(ISMS) enables information to be shared, whilst ensuring the protection of information and computing
assets.
At the most practical level, securing the information on your computer means:
Ensuring that your information remains confidential and only those who should access that
information can.
Knowing that no one has been able to change your information, so you can depend on its
accuracy (information integrity).
Making sure that your information is available when you need it (by making back-up copies and,
if appropriate, storing the back-up copies off-site).
system. The term “non-repudiation” implies that an action or transaction cannot be denied by the
individual or system that performed it.
Integrity: Integrity refers to the accuracy and completeness of information and the prevention of
unauthorized or accidental modification of data. This ensures that data is not tampered with and
remains trustworthy.
Complying with Regulations: Many industries, such as healthcare, finance, and government,
are subject to strict regulations and laws that require them to protect sensitive data. Failure to
comply with these regulations can result in legal and financial penalties, as well as damage to the
organization’s reputation.
Maintaining Business Continuity: Information security helps ensure that critical business
operations can continue in the event of a disaster, such as a cyber-attack or natural disaster.
Without proper security measures in place, an organization’s data and systems could be
compromised, leading to significant downtime and lost revenue.
Protecting Customer Trust: Customers expect organizations to keep their data safe and secure.
Breaches or data leaks can erode customer trust, leading to a loss of business and damage to the
organization’s reputation