AGL 38.11 Decreased By ▼ -1.47 (-3.71%)
AIRLINK 128.60 Decreased By ▼ -2.62 (-2%)
BOP 6.88 Increased By ▲ 0.07 (1.03%)
CNERGY 4.56 Decreased By ▼ -0.15 (-3.18%)
DCL 8.10 Decreased By ▼ -0.34 (-4.03%)
DFML 39.49 Decreased By ▼ -1.98 (-4.77%)
DGKC 78.68 Decreased By ▼ -3.41 (-4.15%)
FCCL 31.56 Decreased By ▼ -1.54 (-4.65%)
FFBL 70.40 Decreased By ▼ -2.47 (-3.39%)
FFL 12.04 Decreased By ▼ -0.22 (-1.79%)
HUBC 108.05 Decreased By ▼ -2.69 (-2.43%)
HUMNL 13.50 Decreased By ▼ -1.01 (-6.96%)
KEL 4.88 Decreased By ▼ -0.31 (-5.97%)
KOSM 7.50 Decreased By ▼ -0.11 (-1.45%)
MLCF 37.48 Decreased By ▼ -1.42 (-3.65%)
NBP 67.30 Increased By ▲ 3.29 (5.14%)
OGDC 187.65 Decreased By ▼ -5.17 (-2.68%)
PAEL 24.98 Decreased By ▼ -0.70 (-2.73%)
PIBTL 7.25 Decreased By ▼ -0.09 (-1.23%)
PPL 147.50 Decreased By ▼ -6.57 (-4.26%)
PRL 24.75 Decreased By ▼ -1.08 (-4.18%)
PTC 17.00 Decreased By ▼ -0.81 (-4.55%)
SEARL 79.00 Decreased By ▼ -3.30 (-4.01%)
TELE 7.44 Decreased By ▼ -0.32 (-4.12%)
TOMCL 32.75 Decreased By ▼ -0.71 (-2.12%)
TPLP 8.20 Decreased By ▼ -0.29 (-3.42%)
TREET 16.50 Decreased By ▼ -0.12 (-0.72%)
TRG 56.25 Decreased By ▼ -1.15 (-2%)
UNITY 27.70 Increased By ▲ 0.19 (0.69%)
WTL 1.32 Decreased By ▼ -0.05 (-3.65%)
BR100 10,297 Decreased By -207.2 (-1.97%)
BR30 30,324 Decreased By -902.7 (-2.89%)
KSE100 96,562 Decreased By -1517.3 (-1.55%)
KSE30 30,098 Decreased By -461.2 (-1.51%)

Information security relates to all aspects of information, that is, spoken, written, printed and electronic or any other medium, including the information handling which has been created, viewed, transported, stored or destroyed. Information security is different than IT security since the same is concerned with security of information within the boundaries of the network infrastructure. Typical confidential information disclosed in an elevator conversation or sent via regular mail does not fall within the bounds of IT security.1
Here the question arises what is information, it basically consists of data having meaning, relevance and purpose and information has to have these attributes. Information creates knowledge and thus knowledge is captured and stored as organised information which is an asset that is why it requires protection.
Governance of information security is a subset of enterprise and it provides strategic direction, as it ensures the achievement of objectives by appropriately managing the risk by using the organisational resources carefully while monitoring the security programme with diligence as the success of an enterprise depends on it.
The organisation must establish and maintain a framework to achieve effective information security governance, by guiding the development and maintenance of a comprehensive information security programme. The institutional responsibility in this regard includes to treat the information security as an intrinsic part of governance. The protection of information assets is achieved through a layered series of technological and non-technological safeguards and controls, ie, safety and environmental security measures, perimeter and physical security, including the background checks, access control measures, user identifiers, passwords, IT technical measures and manual and automated procedures.
Thus the institutional responsibilities in this regard include:
-- Expectation or outcome from the program
-- Knowledge and protection of information asset
-- Benefit
-- Process integration
These necessary safeguards and controls generally address threats and vulnerabilities to reduce potential impacts with a framework of defined and acceptable levels. The integrated security system must comprehensively cover the key controls.
The security objectives are achieved when:
-- Information is available and usable when required, and the systems that provide it can appropriately resist or recover from attacks.
-- Information is observed by or disclosed to only those who have a need to know.
-- Information is protected against unauthorised modification.
-- Business transactions and information exchange between enterprise locations and external trading partners in trustworthy.
The system of security created thus covers the needed goals of information availability, confidentiality, integrity, authority and repudiation. The derived outcome can be achieved through.
- Effective communication;
- Constructive approach;
- Team relationship;
- Common language; and
- Shared commitments
The information security governance framework generally consists of:
-- Security risk management methodology
-- Strategy explicitly linked with business and IT objectives
-- An effective security organisational structure
-- A security strategy based on the value of information protected and delivered
-- Policies based on comprehensive strategy, control and regulation
-- security standards for each policy to ensure that procedures and guidelines conform to the policy preferences
-- Institutionalised monitoring processes for compliance and to provide effective feedback for the mitigation of risk
-- A process to ensure continued evaluation, standards, procedures, risks and process for updating.
The system will provide alignment, business strategies, managing the risk and resources, knowledge and value delivery as shown below in the information security governance chart.
How we can achieve it that is by placing information security on agenda of top bosses, identifying security leaders, by adopting an effective policy.
The governance of information security can increase predictability and reduce uncertainty by creating a firm foundation for efficient information system which will build trust, reputation and confidence.
(The writer is an advocate and is currently working as an associate with Azim-ud-Din Law Associates Karachi)
1 From an information security perspective, the nature and type of compromise is not as important as the fact that security has been breached; that is the crucial concern.

Copyright Business Recorder, 2015

Comments

Comments are closed.