Page 14 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 14
Information Security and Privacy
Notes Self Assessment
Fill in the blanks:
7. Current information infrastructures are combination of traditional information systems
and ....................... technology.
8. The function of the World Wide Web is offered and assured by the .......................
organizations.
9. All the systems and spheres are incompletely or completely dependent on the ..................... .
10. ....................... is used to format messages between web services.
11. The function of each ....................... offers the work of one, tens, hundreds or even thousands
of websites.
1.5 Information System Security and Threats
Security information management is a type of software that automates the collection of event
log data from security devices, such as such as firewalls, proxy servers, intrusion-detection
systems and anti-virus software.
The short form of Security information management is SIM. The SIM translates the logged data
into correlated and simplified formats. Many SIM architecture provides security reporting,
analysis and reporting for Sarbanes-Oxley, HIPAA, Basel II, FISMA and Visa CISP compliance
audits.
A SIM automates collection and analysis of information from all the security components in a
network. Rather than having to look at logs and alerts from firewall, IDS, anti-virus, VPN, and
other security systems, a security manager can obtain all of this information from a single SIM
console. Some SIMs simply aggregate reports from these various components; others correlate
the information to improve the quality of overall security information.
Security Information Management (SIM) products (also referred to as Security Information and
Event Management or Security Event Management) automate the manual process of collecting
security-specific event-log data from file systems, security appliances and other network devices.
These products, which can be hardware, software, or a service, feature data-aggregation and
network event-correlation features similar to those found in network management software.
Information can be collected from firewalls, proxy servers, intrusion-detection systems, intrusion-
prevention systems, routers and switches, and anti-spam, anti-virus and anti-spyware software.
In addition to being able to access a number of sources for this information, SIM products try to
distinguish themselves by how quickly they can collect the information without missing an
event, how well the can correlate specific security events with user identities, and how rich their
reporting capabilities are to help managers.
Example: Distinguish a legitimate security event from a false-positive alert.
The main objective of Security Information Management is to prevent interruptions to business
activities and ensure the correct and secure operation of computer and network facilities. It can
be obtained by:
1. Minimizing the risk of systems failures (through use of appropriate operational procedures
and plans).
2. Safeguarding the integrity of the organization’s software and data.
8 LOVELY PROFESSIONAL UNIVERSITY