10.08.2015 Views

Usability and Security

Usability and Security - Vurore

Usability and Security - Vurore

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.2.1 DefinitionsLike usability, we have seen that information security in the literature has been used broadly <strong>and</strong> isdefined in different ways:• Preservation of confidentiality, integrity <strong>and</strong> availability of information 8 ;• Information <strong>Security</strong> refers to the processes <strong>and</strong> methodologies which are designed <strong>and</strong>implemented to protect print, electronic, or any other form of confidential, private <strong>and</strong> sensitiveinformation or data from unauthorized access, use, misuse, disclosure, destruction, modification, ordisruption 9 ;• The term “information security” means protecting information <strong>and</strong> information systems fromunauthorized access, use, disclosure, disruption, modification, or destruction 10 ;• Simply put, information security describes all measures taken to prevent unauthorized use ofelectronic data whether this unauthorized use takes the form of disclosure, alteration, substitution,or destruction of the data concerned 11 .2.2.2 Definition usedFor the uniformity we use the ISO definition of information security in this thesis which is defined as the:“preservation of confidentiality, integrity <strong>and</strong> availability of information 8 ”. These three aspects are furtherdefined as:• Confidentiality: the property that information is not made available or disclosed to unauthorizedindividuals, entities, or processes;• Integrity: the property of safeguarding the accuracy <strong>and</strong> completeness of assets;• Availability: the property of being accessible <strong>and</strong> usable upon dem<strong>and</strong> by an authorized entity.2.2.3 <strong>Security</strong> requirementsMany information systems have not been designed to be secure. The security that can be achieved throughtechnical means is limited <strong>and</strong> should be supported by appropriate management <strong>and</strong> procedures.Identifying which controls should be in place requires careful planning <strong>and</strong> attention to detail. To establishthese security requirements, organizations can refer to different sources 8 . Once source is derived fromassessing risks in the organization by means of a risk assessment. Another source is the legal, statutory<strong>and</strong> regulatory requirements that an organization has to satisfy. A further source is the particular set ofprinciples, objectives <strong>and</strong> business requirements for information processing that an organization hasdeveloped to support its operations.2.2.4 Risk assessmentRisk assessments include the systematic approach of estimating the magnitude of risks (risk analysis) <strong>and</strong>the process of comparing the estimated risks against risk criteria to determine the significance of the risks8 . Performing a risk analysis within an organization can be done by means of a st<strong>and</strong>ardized approach or a6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!