Ýêîíîìè÷åñêèå íàóêè. Ìàðêåòèíã è ìåíåäæìåíò

 

D. Sikorskyi

Taras Shevchenko Kyiv National University, Ukraine

Information security process based on the  Information Security Management System

 

Any activity of a company can be followed by the events that can bring positive possibilities as well as danger for the company. Risk monitoring during development of a corporate strategy allows to be more prepared for any possible situations.

One of the risks is information. Information risk is a measure of the information security which shows a possibility of danger appearance and the size of loss for the object [1].

The purpose of this work is an international standard analysis of the information security ISO / IEC 27001 which is going to be a platform for the information risk evaluation modelling.

It is recommended to use standards, guides and regulations for risk evaluation. There are documents of the international organizations on standardization ISO, IEC (ISO / IEC) firstly.

In 1992 Department of Trade and Industry of Great Britain published Code of Practice for Information Security Management. Just this Code at a later date was a main core of the information security international standard.

The international standard ISO / IEC 27001:2005 “Information Security Management Systems. Requirements” sets requirements for information security management systems to demonstrate company capability to defend its own information resources [6].

Information Security Management Systems includes important operation procedures such as risks management, documents management, records management, internal audit, constant improvement [ 8].

A new version of this standard was published in 2013 with a name ISO 27001:2013 “Information Technology – Security Techniques - Code of Practice for Information Security Management”. The main goal of this standard is to provide more flexible, optimized approach to ensure effective risk management [3; 4].

A new version includes security factors to ensure actuality of standard and capability of application to current risks, namely: private data theft, threat due to mobile devices usage and other network vulnerability [4].

So, now because of a new structure of the company standard while providing a few information security standards there will be a high saving of money due to the integration policies and procedures implementation. There is a necessity to integrate the information security system ISO 27001:2013 with such system as business management continuity ISO / IEC 22301, management system of IT services ISO / IEC 20000-1, quality management system ISO 9001 [4].

Organization certified under standard ISO 27001:2000 will need to update the information security management system to comply with the requirements of the new standard version. British Standards Institution and other certified bodies haven’t published a plan of transition to a new version of the standard yet, but there are some plans which were used in a similar situation with other standards.  Transition period for update is going to be two years approximately since the moment of publishing of a new version [3; 4].

There is an increase of quantity of compulsory items in the new version of the standard from five to seven (tab. 1) [8].

Table 1

Comparison of two revision of the International Standard ISO / IEC 27001

Structure of ISO / IEC 27001:2005

Structure of ISO / IEC 27001:2013

0. Inrtoduction

0. Inrtoduction

1Scope

1Scope

2. Normative references

2. Normative references

3. Terms and Definition

3. Terms and Definition

4. Information Security System

4. Information Security System

5. Management Responsibility

5. Leadership

6. Internal ISMS audits

6. Planning

7. Management review

7. Support

8. ISMS improvement

8. Operation

 

9. Performance evaluation

10. Improvement

 

The auditor information security management system detects the presence of mandatory items standard. If any item is missing or ineffective, the auditor is unable to recommend the company to issue the certificate or may be deprived of it.

Information Security Management System based on ISO 27001 will:

− make the most of information assets understandable to the company's management;

− identify the main security threats to existing business processes;

− calculate risks and make decisions based on the business objectives of the company;

− ensure effective management system in critical situations;

− adhere to a security policy (find and correct the weaknesses in the system of information security);

− define personal responsibility;

− to achieve cost reduction and optimization support system security;

− facilitate the integration subsystem security business processes and integration with ISO 9001:2000;

− to demonstrate to customers , partners, business owners their commitment to information security;

− obtain the international recognition and gain the authority of the company on the domestic and foreign markets;

− emphasize business transparency before the law.

Standard ISO 27001 has been internationally recognized as the standard of information security. If organization has certificate ISO 27001, it means that it was tested and satisfies the requirements of the highest criteria for information security management [5].

Thus, the new redaction of the International Standard for Information Security ISO / IEC 27001:2013 facilitates leaders involvement in information security management processes. Standard gives instrument, which makes it possible more effective interaction between leaders and risk- managers.

Some requirements have become less stringent; it gives choice flexibility of methods and protective measures. Requirements and measures of the previous version have been significantly optimized and, therefore, many contentious issues have been overcome.

Harmonization of ISO / IEC 27001:2013 with all current standards issued by the International Organization for Standardization, enables companies to integrate their information security management system in existing processes more effectively (if processes are built on the methodology of standards ISO).

So, there are many standards of information security. But the use of any standard is benefits: a good image of the organization, the demonstration its stable position and so on.

 

References:

1. Analytic agency Smyslographiya (2014), available at: http://www.s-graph.ru/Glossary/37/ (Accessed 31 March 2014).

2. Publishing House “Komizdat” (2014), “Security and Risk Management”, available at: http://www.comizdat.com/index_.php?in=ksks_articles_id&id=567 (Accessed 31 March 2014).

3. Information Security (2014), “The Global Standart ISO / IEC 27001:2013. Projection into the Future of the Industry”, available at: http://www.itsec.ru/articles2/pravo/mezhdunarodnyy-standart-iso-iec-270012013.-vzglyad-v-buduschee-industrii-ib/ (Accessed 31 March 2014).

4. Official site of International Organization for Standardization (2014), “The new version of the Global Standart ISO/IEC 27001 will help more effectively to combat particular risks in the sphere of Information Technologies. 5. Íîâàÿ âåðñèÿ ñòàíäàðòà ISO / IEC 27001”, available at: http://www.iso.org/iso/ru/home/news_index/news_archive/news.htm?refid=Ref1767 (Accessed 31 March 2014).

5. Official site “Avista consulting” (2014), available at: http://avista24.ru/sertifikaciya/iso_27001/ (Accessed 31 March 2014).

6TÜV NORD (2014), “Information security management system on the demand of the Global Standard ISO / IEC 27001:2005”, available at: http://www.tuev-nord.com.ua/index.php/sertsm/isoiec-27001 (Accessed 31 March 2014).

7. Information Security (2014), “Standardization in the information security management sphere: international experience”, available at: http://www.itsec.ru/articles2/pravo/standartiz-v-oblasti-ib-zarubezhn-oput-chast-2 (Accessed 31 March 2014).

8. Intercert Ukraine (2014), “The Global Standart ISO / IEC 27001:2013”, available at: http://intercert.com.ua/articles/posts/292-standart-iso-iec-27001-2013 (Accessed 31 March 2014).

9. TMS Ukraine (2014), Information security management ISO / IEC 27001:2013, available at: http://tms-ua.com/standarts/iso-27001-2013/ (Accessed 31 March 2014).