Information Security 101

Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability (Tier 3), or CIA for short, support business (Tier 2), and create and deliver values (Tier 1).

Source: The Effective CISSP: Security and Risk Management

What is Risk?
What is Risk?

Risk is the “effect of uncertainty on objectives.” (ISO 31000) In the context of information security, a threat is any risk that may bring negative effects on objectives, which typically involves a threat source that initiates one or more threat events to exploit vulnerabilities and results in adverse impact.

NIST Generic Risk Model (NIST SP 800-30 R1)
NIST Generic Risk Model (NIST SP 800-30 R1)

Vulnerability “includes a weakness of an asset or group of assets which can be exploited by a threat” (ISO/IEC 21827) or refers to “weakness in the security of an IT-system that can be exploited or triggered by a threat.” (ISO/TR 22100-4)

  • Weakness is one “kind of deficiency.” (ISO 81001-1)
  • An asset is anything of value and worthy of protection.
  • Protection refers to the endeavor of keeping objectives from deviation. Protection means applying risk treatments in risk management or implementing security controls (aka safeguards) in the context of information security.
  • Protecting human life is always the priority.
ISO 31000
ISO 31000

An information system, aka IT-system, is “a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. In the context of this publication, the definition includes the environment in which the information system operates (i.e., people, processes, technologies, facilities, and cyberspace).” (NIST SP 800-39)

A CISSP is an ISC2 certified professional who knows very well how to protect information systems.

The Peacock as a Metaphor for Information System
The Peacock as a Metaphor for Information System

Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams, and an informative reference for security professionals.

References

1 thought on “Information Security 101

  1. Pingback: 資安入門 – Choson資安大小事

Leave a Reply