Understanding IS Security and IS audit

IS security or information security refers to the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, that includes those measures necessary to detect, document, and counter such threats. It protects information, processes, and communication and protects sensitive business information from invasion. Information security is intended to protect organizations against malicious attacks. The two primary types of attacks are active and passive. Active attacks are considered more difficult to prevent, while passive attacks are easier to prevent with strong security measures.

Difference between IS security and IT security:

Information security Protects information processes and communication. Whereas, IT security is a component of information security that refers “only” to the protection of information on IT systems. In other words, IT security protects technical systems, such as hardware, software, and networks from unauthorized access, cyberattacks, and other malicious activity. Thus, information security has a broader scope than IT security. The most commonly cited examples of IT security include digital security disciplines such as endpoint security, cloud security, network security, and application security. IT security includes physical security measures like locks, ID cards, and surveillance cameras—required to protect buildings and devices that house data and IT assets.

Information security (IS) audit:

An information security (IS) audit, also known as a security audit or cybersecurity audit, is a comprehensive evaluation of an organization’s security posture. It examines an organization’s security systems, data protection policies, and safety procedures to identify vulnerabilities and recommends areas for improvement to security measures.

Some things that might be flagged during a security audit include insufficient password complexity, Inconsistent ACLs on folders*, Non-existent or insufficient file activity auditing, and Sensitive data not stored and protected correctly with encryption.

* An Access Control List (ACL) is a list of permissions that controls access to files and folders and determines what actions users can perform on them.

It may also be triggered by a number of events, like significant changes to IT infrastructure or systems, Regulatory requirements, and a security breach or incident.

Benefits of IS audit:

The audit ensures the availability of the information system, and the integrity and confidentiality of data including reviewing system records, activities, and related documents and evaluating regulatory compliance.

Security Considerations related Posts:

What are Cyber Threats of Different types?Control Mechanism for risk concerning Computer networkComputer Audit/IT Audit  
Understanding IS security and IS auditEvaluation Requirement for IT SecurityWhat are Data Security and Privacy?
What is Digital rights management (DRM)?  

Surendra Naik

Share
Published by
Surendra Naik

Recent Posts

Distinction between Capital Receipt and Revenue Receipts

There are two different types of receipts that a business or a government generates during…

1 hour ago

Govt. revises norms for Dividend payout, Bonus Shares, Stock split, and Share buybacks

The Department of Investment and Public Asset Management (DIPAM) released new guidelines amending its earlier2016…

4 hours ago

Bank Holidays 2025: National Capital Territory Delhi

The Government of the National Capital Territory of Delhi has released the official list of…

1 day ago

Bank Holidays 2025: State of Rajasthan

The Government of Rajasthan in their Order No.16 (1).v.m./2024 dated 19.11.2024 declared bank Holidays under…

1 day ago

Distinguishing Capital expenditure and Revenue expenditure

Meaning of Expenditure and Expenses: Expenditure refers to the total amount spent to acquire goods…

1 day ago

Bank Holidays 2025: Gujarat State

In pursuance of the explanation in section 25 of NI Act 1881, read with the…

2 days ago