22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Even though the Computer Security act has been passed in the United States<br />

and aims to protect the interests of this country, this definition and its application<br />

is global and the definition quoted applies to any country and any company in the<br />

world. In other words, sensitive information is such that it needs to be kept<br />

confidential and must be protected from unauthorized access and disclosure.<br />

Furthermore, this also means that appropriate measures must apply to prevent<br />

the destruction or alteration of this information.<br />

For example, in a bank, some pieces of paper (for example, bank notes, paper<br />

bills, currency) are extensively protected. Other pieces, such as withdrawal and<br />

deposit slips to be filled out by customers, are not protected at all. In fact they are<br />

placed on small tables for anyone to take.<br />

Information is the same. There is some information that does not need to be<br />

protected because it is common (or public) knowledge. On the other hand, there<br />

is information that should be well protected, because its disclosure could be<br />

damaging: it could lead to loss of an important competitive advantage, it could<br />

lead to a severe loss of reputation or customer confidence, or, depending on the<br />

type of business, it could lead to the injury (or the death) of people.<br />

Data classification fulfills another important role. In addition to spelling out how<br />

information should be secured, it also spells out how information should be<br />

properly disclosed. The public data on a Web site may require only basic security<br />

to prevent its defacement, but it should also be available freely enough so that<br />

everyone can access it without any problems.<br />

Depending on the type of business—public sector and governmental agencies<br />

deal in certain cases with very sensitive personal information, whereas private<br />

sector organizations deal generally with sensitive commercial information—there<br />

are different classification methods and categories in place. The following data<br />

classifications apply in public and private sector businesses and organizations.<br />

Public or unclassified<br />

Information is considered public or unclassified if its disclosure would have no<br />

impact whatsoever on a business. Data integrity is not vital. Loss of service due<br />

to malicious attacks is an acceptable danger. Examples of this type of<br />

information would be the public portion of the Web site of a business and any<br />

information available from other sources and other means about the business.<br />

Internal<br />

Efforts should be made to keep information in the internal category within the<br />

organization, but should this information become public, the consequences will<br />

not be overly critical (there might be a loss of face, or it could be an<br />

embarrassment for the business, but not substantially more). Data integrity is<br />

important but not vital. Internal access is segregated between different groups of<br />

Chapter 1. Fundamentals of IT security 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!