Understanding IS Security and IS audit

IS security or information security refers to the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, that includes those measures necessary to detect, document, and counter such threats. It protects information, processes, and communication and protects sensitive business information from invasion. Information security is intended to protect organizations against malicious attacks. The two primary types of attacks are active and passive. Active attacks are considered more difficult to prevent, while passive attacks are easier to prevent with strong security measures.

Difference between IS security and IT security:

Information security Protects information processes and communication. Whereas, IT security is a component of information security that refers “only” to the protection of information on IT systems. In other words, IT security protects technical systems, such as hardware, software, and networks from unauthorized access, cyberattacks, and other malicious activity. Thus, information security has a broader scope than IT security. The most commonly cited examples of IT security include digital security disciplines such as endpoint security, cloud security, network security, and application security. IT security includes physical security measures like locks, ID cards, and surveillance cameras—required to protect buildings and devices that house data and IT assets.

Information security (IS) audit:

An information security (IS) audit, also known as a security audit or cybersecurity audit, is a comprehensive evaluation of an organization’s security posture. It examines an organization’s security systems, data protection policies, and safety procedures to identify vulnerabilities and recommends areas for improvement to security measures.

Some things that might be flagged during a security audit include insufficient password complexity, Inconsistent ACLs on folders*, Non-existent or insufficient file activity auditing, and Sensitive data not stored and protected correctly with encryption.

* An Access Control List (ACL) is a list of permissions that controls access to files and folders and determines what actions users can perform on them.

It may also be triggered by a number of events, like significant changes to IT infrastructure or systems, Regulatory requirements, and a security breach or incident.

Benefits of IS audit:

The audit ensures the availability of the information system, and the integrity and confidentiality of data including reviewing system records, activities, and related documents and evaluating regulatory compliance.

Security Considerations related Posts:

What are Cyber Threats of Different types?Control Mechanism for risk concerning Computer networkComputer Audit/IT Audit  
Understanding IS security and IS auditEvaluation Requirement for IT SecurityWhat are Data Security and Privacy?
What is Digital rights management (DRM)?  

Surendra Naik

Share
Published by
Surendra Naik

Recent Posts

Overview of the IT Act: Gopalakrishna Committee Recommendations

The Gopalakrishnan committee is a committee of experts on the concept of non-personal data (NPD)…

8 hours ago

Evaluation requirement for IT security

Evaluation requirement for IT Security refers to the procedure of conducting regular reviews and checks…

2 days ago

Computer Audit/IT Audit

Computer audits, also known as IT audits, are important because they help organizations protect their…

2 days ago

Control Mechanism for Risk Concern in Computer network

A Security Mechanism for Risk Concern Areas in Computer Networks is a method or technology…

3 days ago

Impact of IT on Banks and Fintech Disruption: Overview

The banking sector has undergone an intense transformation in recent years, driven by rapid advancements…

4 days ago

Need  for Technological up gradation: Rise and fall of global companies

Technological upgrading refers to the planned and focused improvement of existing technology and production methods…

4 days ago