Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

2.1 Need For Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

DEPARTMENT NAME

Class: Batch:
Course code: Course Title:

UNIT II SECURITY INVESTIGATION

Security Investigation: Need for Security – Business Needs – Threats – Attacks – Legal, Ethical
and Professional Issues in Information Security – Selecting Risk Control Strategy – Risk
Management – Recom mended Risk Control Practices.

Security investigation means the investigative procedures conducted by the competent authority of a
Member State in accordance with its national law and regulations in order to obtain an assurance that
nothing adverse is known which would prevent an individual from being granted a security clearance up
to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or higher).

Five Phase Investigation Process

Phase I: Preparation and Planning.

Phase II: Information Gathering and Problem Identification.

Phase III: Verification and Analysis.

Phase IV: Disbursement of Disciplinary and Corrective Action.

Phase V: Prevention and Education.

The 3 types of investigations


Scientists use three types of investigations to research and develop explanations for events in the
nature:
 Descriptive investigation,
 Comparative investigation, and
 Experimental investigation.

Types of Security:

 Physical security-Physical security refers to measures that protect physical assets, such as
buildings, property, and people. This can include things like locks, cameras, alarms, and guards.

 Cyber security-Cyber security is becoming increasingly important in today’s world, as more


and more transactions and activities are conducted online. Cyber security measures protect
against cyber-attacks, such as hacking and malware.

Prepared By: Page 1


DEPARTMENT NAME
Class: Batch:
Course code: Course Title:

 Personal security-Personal security refers to measures that protect individuals, such as self-
defense training and personal alarm systems.

The Role of Investigations:


 Investigations are a crucial part of security, as they help to uncover the root cause of a problem
and determine the best course of action to prevent future incidents. Investigations can take many
different forms, including criminal investigations, fraud investigations, and background checks.

 Criminal investigations are conducted by law enforcement agencies and are used to gather
evidence in criminal cases.

 Fraud investigations are conducted by companies or organizations to detect and prevent


fraudulent activities. These investigations may involve the use of forensic accounting, digital
forensics, and other techniques to uncover evidence of fraud.

The Benefits of Security and Investigations


1. Risk Mitigation:
o Security investigations help identify vulnerabilities and potential risks. By proactively
addressing these issues, organizations can prevent security breaches, data leaks, and
financial losses.
2. Incident Response:
o When incidents occur (such as cyber-attacks or unauthorized access), investigations
play a crucial role in understanding the scope, impact, and root causes. Effective
incident response minimizes damage and aids in recovery.
3. Fraud Detection and Prevention:
o Investigative techniques are vital for detecting fraudulent activities. Whether it’s
financial fraud, identity theft, or insurance scams, investigations help uncover
irregularities and protect individuals and businesses.
4. Compliance and Legal Requirements:
o Organizations must adhere to legal and regulatory standards. Security investigations
ensure compliance by monitoring activities, assessing risks, and maintaining
transparency.
5. Employee Safety and Workplace Security:
o Investigations contribute to a safe work environment. They address workplace
misconduct, harassment, and other issues, promoting employee well-being.
6. Intellectual Property Protection:
o Investigating intellectual property theft or infringement safeguards innovations,
patents, and trade secrets. It preserves an organization’s competitive edge.

Prepared By: Page 2


DEPARTMENT NAME
Class: Batch:
Course code: Course Title:

7. Cyber security Enhancement:


o Investigating cyber threats, malware, and breaches helps improve security protocols.
Lessons learned from investigations lead to better defences.
8. Insight for Decision-Making:
o Investigations provide valuable data. Analysing patterns and trends informs strategic
decisions, resource allocation, and risk management.

2.1 NEED FOR SECURITY

The purpose of information security management is to ensure business continuity and reduce business
damage by preventing and minimizing the impact of security incidents. The Audit Commission Update
report (1998) shows that fraud or cases of IT abuse often occur due to the absence of basic controls,
with one half of all detected frauds found by accident. An Information Security Management System
(ISMS) enables information to be shared, whilst ensuring the protection of information and computing
assets.

At the most practical level, securing the information on your computer means:

 Ensuring that your information remains confidential and only those who should access that
information can.
 Knowing that no one has been able to change your information, so you can depend on its
accuracy (information integrity).
 Making sure that your information is available when you need it (by making back-up copies and,
if appropriate, storing the back-up copies off-site).

The basic principle of Information Security is:

Confidentiality: Confidentiality refers to protecting sensitive information from unauthorized access


or disclosure. This involves keeping confidential data secure and accessible only to those who are
authorized to access it.

Authentication: Authentication is a crucial aspect of the principle of Information Security and is


used to verify the identity of individuals or systems attempting to access sensitive information or
systems. It is a process of verifying that a person or system is who or what it claims to be.
Authentication is a critical component of Confidentiality and Availability as it helps prevent
unauthorized access to sensitive information and systems.

Non-Repudiation: Non-repudiation is a principle of Information Security that refers to the ability to


prove that an action or transaction took place and that it was performed by a specific individual or

Prepared By: Page 3


DEPARTMENT NAME
Class: Batch:
Course code: Course Title:

system. The term “non-repudiation” implies that an action or transaction cannot be denied by the
individual or system that performed it.

Integrity: Integrity refers to the accuracy and completeness of information and the prevention of
unauthorized or accidental modification of data. This ensures that data is not tampered with and
remains trustworthy.

The need for Information security:


 Information security is essential for protecting sensitive and valuable data from unauthorized
access, use, disclosure, disruption, modification, or destruction. Here are some of the key
reasons why information security is important:

 Protecting Confidential Information: Confidential information, such as personal data,


financial records, trade secrets, and intellectual property, must be kept secure to prevent it
from falling into the wrong hands. This type of information is valuable and can be used for
identity theft, fraud, or other malicious purposes.

 Complying with Regulations: Many industries, such as healthcare, finance, and government,
are subject to strict regulations and laws that require them to protect sensitive data. Failure to
comply with these regulations can result in legal and financial penalties, as well as damage to the
organization’s reputation.

 Maintaining Business Continuity: Information security helps ensure that critical business
operations can continue in the event of a disaster, such as a cyber-attack or natural disaster.
Without proper security measures in place, an organization’s data and systems could be
compromised, leading to significant downtime and lost revenue.

 Protecting Customer Trust: Customers expect organizations to keep their data safe and secure.
Breaches or data leaks can erode customer trust, leading to a loss of business and damage to the
organization’s reputation

 Preventing Cyber-attacks: Cyber-attacks, such as viruses, malware, phishing, and ransom


ware, are becoming increasingly sophisticated and frequent. Information security helps prevent
these attacks and minimizes their impact if they do occur.

 Protecting Employee Information: Organizations also have a responsibility to protect


employee data, such as payroll records, health information, and personal details. This information
is often targeted by cybercriminals, and its theft can lead to identity theft and financial fraud.

Prepared By: Page 4


DEPARTMENT NAME
Class: Batch:
Course code: Course Title:

Prepared By: Page 5

You might also like