Wednesday, April 25, 2012

The Mindset of Information Security: Walking a razor thin line

















The Mindset of Information Security: Walking a razor thin line
Samuel Warren
IS461-Information Security Overview
Professor Dan Morrill
February 8, 2011

The Mindset of Information Security: Walking a razor thin line
In the mid-late Twentieth Century, there was a commonly held belief to “do the right thing.” Those who want to “do the right thing” because it is the right thing to do are said to have morals or strongly held beliefs. As organizations began to grow, many of them looked for a way to translate that notion of “doing the right thing” to an organized set of rules. To better explain, Merriam-Webster’s Dictionary of Law describes an organized set of rules as such: “The rules or standards governing the conduct of a person or the conduct of the members of a profession.” In essence, the rules were created out of a deep-seated desire to keep “doing the right thing” in an organization with a way to penalize those who choose to disregard them. Many professions have their own unique code of ethics associated with them. While some overlap, they are designed specifically for the governance of each profession, including terminology and consequences associated with breaking that code. For example, in the practice of Law, it is common for someone to be stripped of their title and practice, a process called dis-barring, for ethics violations. There are, in many cases, larger consequences associated with a breach of ethics. In Medicine, a doctor can not only lose his license to practice medicine, but also be sued for mal-practice. In the realm of Information Security (InfoSec), there are several different sets of ethical codes and guidelines. But which is the best? What approach should InfoSec professionals take when it comes to ethics? InfoSec, like other professions, requires a great deal of discernment and balance.
The differences between ethics will almost always exist. Instead of fighting, trying to create a new set of ethics, the best course of action one can take is finding a set of ethics that best aligns with one’s morals. Depending on the field, there may be one set of ethics or many.  One example of a unified ethical practice among lawyers is keeping their client’s information confidential. The biggest reason to that is they want to ensure a level of trust between them. If a defense lawyer accepts a case where the defendant is actually guilty, the lawyer’s job is not to give a moral judgment on what the defendant may have done; his job is to get the defendant alleviated consequences, if not outright acquittal. In InfoSec, however, there are multiple sets of ethics. A Venn diagram would show quite a bit of overlap between just the two largest bodies: the ISACA and ISC2. The differences are where interpretation can creep in and cause confusion. One poignant example is found when examining the two on their individual sites. On the ISC2 site, under the heading “Objectives for Guidance,” the following subheading is confusing: “To Discourage such behavior as… Professional recognition of or association with amateurs” (www.ISC2.org, 2011). Whereas on the ISACA site, they reference, “Support the professional education of stakeholders in enhancing their understanding of the governance and management of enterprise information systems and technology, including: audit, control, security and risk management” (www.ISACA.ORG, 2011).  
They both seem to indicate education, but where they differ here is the approach. The ISACA encourages professional education, but the depth at which they approach it is different. ISACA seems to be a little more broad-based, focusing on management and policy. However, ISC2 seems to be better known among the other high-tech fields. There are definite differences in how each set of ethical standards deal with issues, but the best possible way to deal with the differences is to find one that works well for the organization. In essence, one has to just deal with the differences in stride. As long as an organization allows their Information Security professionals to keep them up-to-date on the main security concerns as it relates to ethics, any organization can deal with the differences appropriately.
One thought that needs to be considered when talking about ethics is balance. If the world of Information Security were just considering keeping information secure, it would be an easy job! However, many know that the aforementioned career is far more involved. While the title suggests a course of action, there are many other areas to consider, such as organizational needs. If a customer wants their information secure, but cannot afford the system an InfoSec professional recommends, obviously there is an adjustment that needs to be made. One difficult place to find that balance is a not-for-profit type organization, such as a school or church.
Institutions of higher learning impose unique challenges for chief information officers. On the one hand, resources must be open to embrace academic freedom and interactive learning environments. At the same time, openness makes universities targets [for a] lot cyber break-ins and other unauthorized activities. (Nolin, 2006)
The key for some of these organizations is finding a balance between the demands and what is secure enough. While one cannot completely account for every possible criminal mindset, one can definitely put in as many safeguards as possible. Ultimately, the criminal mind is ever-changing. It is looking for cracks, exploits, and weaknesses. The question that needs to be asked more often is “How much risk are we willing to absorb?” While every organization is different, and presents its own challenges, finding a balance of how much is too much and what needs to be protected is the key to keeping information secure. If InfoSec professionals can keep the organization in a good balance and protect everything that is inside of the acceptable margins, the organization will, at the very least, be more securely protected.
            Information Security is a complex, challenging, and rewarding field. With so many different concerns that need to be addressed, how does one make sure the information they are protecting is secure? Unfortunately, there is no easy answer to that question. However, if an InfoSec professional can maintain a clear understanding of what system of ethics works for their organization and maintain balance among protection and risk, they will be able to keep the information they are protecting more secure. Although the technology and mindsets of InfoSec professionals are rapidly becoming better acquainted with the criminal mind, it seems they are just one step behind the criminals. By staying informed on recent events in the field of information security, the gap will continue to shrink and cause better protected information to become a byproduct. Information Security is really a balancing act on a razor thin line. There are very few truly secure ways to keep information; however, mitigating the risk an organization takes on is what Information Security is all about.

References
Ethics. (n.d.). Merriam-Webster's Dictionary of Law. Retrieved February 08, 2011, from Dictionary.com website: http://dictionary.reference.com/browse/ethics
ISACA. (2011). Code of Professional Ethics . Retrieved February 9, 2011, from ISACA website: http://www.isaca.org/Certification/Code-of-Professional-Ethics/Pages/default.aspx
ISC2. (2011). Code, Objectives for Guidance, To Discourage Such Behavior As. In (ISC)2 Code of Ethics (par.10). Retrieved February 9, 2011, from (ISC)2 website: https://www.isc2.org/ethics/default.aspx
Norlin, L. (2006). A Secure Balance. American School & University, 78(6), SS44-SS46. Retrieved from EBSCOhost.

No comments:

Post a Comment