18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Of special interest are the various threats and vulnerabilities in information<br />

technology, as these present a unique aspect of the sector, while the rest are applicable<br />

to other domains as well.<br />

Table 1. Key aspects and focus which define IT management and monitoring<br />

proposals<br />

Aspect Focus<br />

Security<br />

Management<br />

(enterprise-wide)<br />

Critical Business<br />

Applications<br />

Computer<br />

Installations<br />

Security management<br />

at enterpise level.<br />

A business<br />

application that is<br />

critical to the success<br />

of the enterprise<br />

A computer<br />

installation that<br />

supports one or more<br />

business applications<br />

Networks A network that<br />

supports one or more<br />

business applications<br />

Issues<br />

Probed<br />

The commitment provided by<br />

top management to promoting<br />

good information security<br />

practices across the enterprise,<br />

along with the allocation of<br />

appropriate resources. The<br />

aspect in question deals with<br />

vulnerabilites caused by<br />

inadequate security policies<br />

adopted by security<br />

management, as well as their<br />

ability to expose and encounter<br />

threats.<br />

The security requirements of<br />

the application and the<br />

arrangements made for<br />

identifying risks and keeping<br />

them within acceptable levels.<br />

Typical vulnerabilities for this<br />

level include holes left by<br />

programmers in the source<br />

code of the applications in<br />

question and bugs, and threats<br />

come from inconsistencies<br />

between data collection and the<br />

application, as well as<br />

unauthorised copying of the<br />

source code by competitors and<br />

illegal users.<br />

How requirements for<br />

computer services are<br />

identified, and how the<br />

computers are set up and run in<br />

order to meet those<br />

requirements. Typical<br />

vulnerabilities for computer<br />

services include storage<br />

devices and hardware<br />

frameworks that can be stolen<br />

or damaged.<br />

How requirements for network<br />

services are identified; and how<br />

the networks are set up and run<br />

~ 450 ~<br />

How they affect the perspectives<br />

set in BSC<br />

User perspective: through the<br />

enterprise’s policy towards user<br />

requests relevant to its systems<br />

Internal process: perspective<br />

through the effectiveness of its<br />

quality control policies and its<br />

quality manual developed with the<br />

help of the internal audit.<br />

Financial perspective: through<br />

costs linked with a decision made<br />

to mentain a decent level of<br />

security for the enterprise’s<br />

systems.<br />

Learning and innovation: through<br />

policies which encourage the<br />

development of a securityconscious<br />

culture, regarding data<br />

handling that promotes individual<br />

actions<br />

User perspective: through<br />

applications which are able to<br />

identify and block requests from<br />

unauthorised users<br />

Internal process perspective:<br />

through procedures and functions<br />

which allow the rapid compiling of<br />

update packages<br />

Financial perspective: through<br />

financial-accounting applications<br />

that don’t distort user inputs<br />

Learning and innovation: through<br />

interactive simulation technologies<br />

as well as evolving programming<br />

enviroments.<br />

User perspective: through<br />

satisfaction pertaining to the<br />

technology used by the enterprise<br />

Internal process perspective:<br />

through the wear and depreciation<br />

of the computer installations and<br />

their compatability with various<br />

equipments<br />

Financial perspective: through their<br />

amortisation rate during operations<br />

Learning and innovation: through<br />

technologies’ adaptive potential.<br />

User perspective: by the<br />

connection speed recorded while<br />

servicing their needs.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!