Chapter 2
Chapter 2
LITERATURE REVIEW
This Chapter presents detailed literature review on the research area. The chapter covers the
literature on the following aspects of information security, its evolution and need, principles and
various components, information security related issues in global context, information security
related issues in Indian organizations, cyber security breaches and threats related issues in Indian
organizations, Information security: National as well International standards and their controls,
and information security policy.
The focus of this Chapter is to present literature related to information security (IS), cyber
security, standards, and information security policy (ISP) concerns of organizations on effective
policy development. The comprehensive information on literature review have been collected
from various journals of international and national repute, books, magazines, and articles and
authenticated websites of bodies working under IT sector organizations and Government of
India. These includes important data collection from various bodies including the reports and
survey carried out in the past by the Ministry of Electronics and Information Technology
(MeitY), Govt. of India, security policy regulators such as Computer Emergency Response
Team-India (CERT-In), National Criminal Records Bureau (NCRB), STQC, and training and
development bodies such as national administrative society, and NIELIT, along with
information, feedback gathered through various seminars, conferences and training attended also
helped a lot.
In order to gain a better insight into subject area on information security and policy related
matters, model development for Indian organizations, the literature review of this research study
Figure 2.1: Systematic Literature Review Process (Sources: Denyerand Tranfield, 2009)
The literature review is organized under the following heads.
2.1.1 Literature on Information and Cyber Security
Many descriptions on information security have been found in the literature. The term is defined
in the multiple aspects. The purpose of information security is to protect the valuable resources
of an organization such as hardware, software and skilled people. Through the selection and
application of appropriate safeguard, security helps the organization to meet its business
objectives or mission by protecting its physical and financial resources, reputation, legal
position, employees and other tangible and intangible assets.
In his study, Pfleeger and Pfleeger (2003) defined the basic four types of information risk viz.
Interception, Interruption, Modification and Fabrication. While defining interception, the
information while in transit is obstructed by unauthorized person. While in the case interruption,
accees to information is either delayed to the authorized person. With the modification threat,
information is tempered before the authorized person receives or accesses it. In the case of
fabrication, the information is sent to recipient by spoofing the identity.
In general, Information security is a broad subject and various definitions are available in the
various sources of literature. In literature various terms and their definitions such as information
security, computer security, information systems security and cyber security are used
interchangeably.
Referring to a report released by NIST during 1996, computer security is the protection
afforded to an automated information system to achieve the business objectives of preserving
the basic elements of integrity, availability and confidentiality of information system resources
(National Institute of Standard and Technology, USA (NIST, 1996 A). While, the term
Information Security is related with the concepts and techniques and is a technical measure to
protect information assets from unauthorized acquisition, damage, disclosure, manipulation,
modification, loss or use (McDaniel (1994). Information security is defined as technical methods
and managerial processes on information resources as if hardware, software and data in order to
keep organizational assets and personal privacy protected (Hong et al., 2003).
As per the definition of American National Standards Institute (ANSI, 2008), cyber security as
the protection of any computer system, software program and data against unauthorized
disclosure, transfer, modification or destruction, whether accidental or intentional. The institute
also used the terms several times in its various reports describing information security and cyber
security interchangeably. Institute releases wide categories of information standards and in the
views of the Institute, information security is the protection of information from a wide range of
threats in order to ensure business continuity, minimize business risk and maximize return on
investment and business opportunities (ISOIIEC 27002, 2005).
In view of protecting the information, Indian Information Technology (Amendment) Act, 2008
has defined cyber security as protecting information, equipment, devices, computer, computer
resources, communication device and information stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction. Information Security is a broad subject of
which technological solutions are only a part.
During mid-1970s, the second stage of IS posed various restrictions in the organization. This
was the age networking of computers and there was more emphasis on the communication and
security aspects. This was the need of education sector and the networks were not open to
outsiders and even that time, the security situation was not alarming.
Third stage of information security faced global challenges when companies began to connect to
Internet and challenges those have emerged with the proliferation of networked computers. Later
after facing many difficulties, individuals, organizations, companies and governments have to
connect their networks to Internet. This was due to their interest to harness the benefits of
Internet Communication Technologies (ICTs), not only for their own profitability, efficiency but
also for creating effectiveness in the business of the organisation. Later, due to several benefits
of ICT, world changes and benefited by several kinds of strategic advantages from the
applications. Due to ICT advancements, security breaches in the form of hacking, data theft,
denial and diminishing of services, loss of confidentiality, etc. have become more venerable and
of big concern worldwide.
In the present age, information security is the element which decides survival of a company or
any organisations. Information security has become a matter of serious concern and apart from
technology, equal emphasis on people, procedure and policy, is the need of the hour (Govt. of
India, MeitY, 2011).
Evolution of information security waves given by Volms (2006) is shown in Table 2.1 below.
Table 2.1: Information Security: Emergence of Issues
The elements of CIA Traid describe the confidentiality, integrity and availability.
• Responsibility (and knowledge of roles): Members are expected to develop their own
work practices on the basis of a clear understanding of their responsibilities.
• Integrity: Information is an important asset for the organizations must focus on
maintaining its integrity.
• Trust (as distinct from control): The organization depend more on self control and
responsibility; there have to be common systems of trust.
• Ethicality (as opposed to rules): Ethical content of informal norms and behaviour.
Shim et al. (2000) have identified IS components into various categories such as physical
security, hardware security, software security, personal security, network security and security
policy as some of the components of information security. As already mentioned a computer
system consists of various parts consists of a computer system. In this view, the associated
physical and environmental security is the first step towards security where computer system
must be placed in secured location with proper access control, visual surveillance, and alarms,
system etc.
Another component is securing environment, and environmental security means securing the
system from fire, water, electrical hazards, heat, humidity, dust, etc. Environmental component
security starts from protection of the hardware, theft and damage (both physical and
environmental hazards). Nowadays in the changing world, employee of an organisation carry
highly valuable information in their laptops and PDAs, which, when stolen, can cause more loss.
This loss is huge and cost implications are on higher side. Security of network and its hardware
components are important to prevent attacks from outside.
Computer systems comprise of software and hardware and software is the brain behind the
hardware. It also consists of operating systems, other system utilities needed to perform various
activities and tasks. While using the computer system, security considerations are often ignored
at the cost of utility and functionality of the software products. Software security is not only a
desirable but also an essential feature of software so that it functions correctly even under
malicious attack. Moreover, software security is about designing secured. It is commonly seen
that most users do not patch their software regularly even though patches are readily available.
New software is discovered even before older ones are obsolete. In establishing the trade-off
between conveniences to operate versus software security, convenience at the cost of security is
to be well taken care of.
Today information has to travel on networks of various kinds such as Wide Area Network
(WAN), Local Area Network (LAN), Virtual Private Network (VPN), and Wi-Fi Networks, etc.
Theses network must be secured enough and their security must be ensured for effective
information security in transiting the data. The data may be form of source codes, software
applications, trade secrets and other intellectual property or data related to employees, customers
or business associates.
It is the fact that ultimately, behind every machine, it is the man which matters. Therefore,
people are often overlooked of security. More reliance is placed on the technical aspects of the
security forgetting that people could be the weakest link. Such category of people would be top
management of an organisation, present and ex-employees as well as customers. It lead to the
situation where there is always a possibility of phishing attacks if the customers are not well
informed and educated about cyber threats.
An information policy is a high-level statement of organisation that belief, goals and objectives.
Standards are mandatory requirements that support individual policies. Procedures based on
information security are mandatory steps and detailed actions required to successfully complete
a task. In this views, guidelines are more general statements which are designed to achieve the
policy objectives but by providing a framework within which to implement procedure.
Non availability of information, when needed, may hamper business and sometimes result in
huge losses. Confidential or critical information falling in the hands of rival organizations may
be catastrophic. Losing third party information may involve legal and financial consequences
apart from loss of reputation. This may be an important requirement of a client or business
partner. Compliance to information security laws, regulations, standards and certifications are
also drivers of information security measures in an organization. In USA, Privacy Act of 1974,
E-Government Act of 2002, Sarbanes-Oxley Act, Health Insurance Portability and
Accountability Act (HIPAA) and Federal Information Security Management Act are examples
of regulatory compliance of information security. In India legal requirements of Section 43A of
Information Technology (Amendment) Act, 2008 and Information Technology (Reasonable
Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011,
make an organization, dealing with sensitive personal information, liable to pay compensation if
it fails to take reasonable information security measures.
The status of information security in most of the countries is far from satisfactory. Even the
most advanced countries are victims of information security breaches. Information related fraud
is common and evolving, but many companies are not prepared for when things go wrong
(Kroll, 2013). Approx. 90% of large organisations and 74% of small organisations experienced
information security breach incident in the last one year (PWC, 2015).
It has been estimated that 689 Million people in 21 countries experienced cybercrime. The cost
associated here globally will top $6 trillion annually by 2021, according to a report by research
firm Cyber security Ventures. According to another estimate; In the US alone, there has been an
increase of nearly 50 per cent in reported cyber incidents against its critical infrastructure from
2012 to 2015 (Norton Cyber Security Insights Report 2016). It is also estimated that average
per person cost of data breaches ranged from $51 in India to $201 in the United States. As per
the report on future of cybercrime and security during 2017, the rapid digitisation of consumers’
lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by
2019.
The Petya malware similarly wreaked havoc on organizations like banks, ministries, newspapers
and electricity firms in many advanced countries, specifically in Ukrain where the radiation
monitoring system at Chernobyl nuclear power plant went offline, and it is reported that in many
infected systems worldwide, important files were overwritten and thus permanently damaged
when the ransoms were not paid. The research has also found that the majority of these
breaches will come from existing IT and network infrastructure, while new threats targeting
mobile devices.
Few important threat incidents in the Indian contest are explored. In the year 2007, a Swedish
‘ethical hacker’ blogged details of e-mail accounts and passwords of several Indian Government
institutions, including the department of defence (DNA, 2007). Due to were lost following a
virus infestation in the computer, during December 2009, all digital records of details pertaining
to gate passes allotted to vehicles, crossed the assembly building. The loss assumes significance
in view of Parliament attack in year 2001 and terror attack in Mumbai (The Hindu, 2008). In
October, 2008, five educated cyber criminals were arrested by Noida Police when they illegally
transferred Rs. 16.6 million from the bank account of victim by hacking into his internet bank
account (HT, 2008). Another such incident includes a major Manesar based multinational IT
company, which has reportedly decided to shift its $10 million R&D facility to Australia due to
an incident of data theft, caused loss of Rs. 7.54 billion (McAffe, 2009). The Times of India,
during 2006 reported that Kingfisher Airlines, which reported loss of Rs. 170 million and
several other airline companies suffered similar losses due to fraudulent ticket purchases from
their online booking systems.
Referring to these kind of security incidents in the banking system, offering internet banking
facilities to their customers, they are increasingly getting vulnerable and exposed to threats such
as stealing of user passwords that can be used to access accounts and transfer funds illegally
(Hindustan Times, 2007). Business to Business (B-B) and Business to Customer (B-C)
business models in the Indian E-Commerce domain have not paid adequate attention towards
management of information security. Very few companies have taken adequate information
security measures. Government departments, for them information is sensitive such as defense,
have largely chosen to use stand-alone computers in a closed local area network to keep their
information secured.
At National level, there have been numerous cases of security breaches of Indian websites, both
of Government and private. Information from servers of more than 6,000 Indian enterprises was
reportedly put up for sale on dark net in one of the biggest data breach reported in the country
(Business Today, 2017).
As per the information reported to and tracked by CERT-In, a total no. of 44679, 49455, 50362
and 27482 cyber security incidents were observed during the year 2014, 2015, 2016 and 2017
(till June) respectively. Based on the discussion documents of Indian Rajya Sabha, major types
of cyber security incidents in Indian organizations include phishing, scanning, probing, website
intrusions and defacements, virus-malicious code, ransomware, denial of service attacks, etc.
(Rajya Sabha Discussion Document, Govt. of India, 2017).
According to a recently published report of Akamai, the cloud delivery firm, India ranks eighth
among countries across the world that are targeted by Distributed Denial of Service (DDoS)
attacks with US and Brazil leading the chart. Is has been found that India is the fifth largest
source for carrying out these DDoS attacks where close to 12 million attacks sourced during
2016 to 2017 (Indiatimes, 2017).
In another recent cyber attack, The Wanna Cry ransom ware which almost infected almost 150
countries. The incident impacted by encrypting data and demanding ransom payments in
bitcoins, forced LG electronics to shutdown large parts of its network after its systems were
affected by it. The malware had its spread globally including major players like Honda (the car
manufacturing company), Telenor, Renault and many Government departments and ministries
including India.
Rashmi Anand, University of Lucknow 15
In India, the ransomware hit major port operations in Mumbai, where one of the three terminals
came to a standstill after the attack (Hindustan times, 2017). Back home in India, the National
Crimes Records Bureau (NCRB) has given figures for cybercrimes cases which points to its
exponential rise in last few years. Approximately 11500 cases were registered in 2015 (as
against 9,622 cases registered in 2014) alone with majority of them related to Financial gains
and frauds. The rise in such cases is especially visible after the country went through the phase
of demonetization and online transactions increased manifold in that period (livemint, 2017).
Table 2.2: Widely Listed Literature on Information Security and Cyber Threats
Sr. no. Research focus References
1. Computer crimes Dhillon & Moores (2001)
2. Economics and investment, violation of Gordon and Loeb (2002),
safeguards Dhillon (2001)
3. Analyzing the past to prepare for the future Webster and Watson (2002)
4. Insider cyber-threats and threat Hamin (2000), Steele and Wargo
management (2007)
5. Human factors in information security Colwill (2009)
6. Trend of the security research Hong et al. (2010)
7. Addressing bad actors and their actions Pfleeger et al.(2010)
8.
Common sense to insider threats Silowash et al. (2012)
9. Threat prediction tool Kaspersky and Furnell (2014)
10. White et al. (2009), Khoumbati
Emergency management, IT Policy and and Themistocleous (2007),
Cyber terrorism Harries and Yellowlees (2012),
Dahiya and Mathew (2016)
Jain has described, in this context of cybercrime where interruption triangle of opportunity,
motive and means for committing cyber crime explicitly explained by him (Jain, 2005). He
further elaborated that there must be a reasonable motive to commit a cybercrime. This could be
just to prove a concern to get financial gains. The criminals use ready-made software or
programming languages as a means to commit crimes. They have become very advanced and
their level of committing the crimes is very high. They can take any kind of risks due to easy
access to information available on the web. In a way, there are multiple opportunities available
to cyber criminal. The system vulnerabilities offer such opportunities.
During 2010, International Telecommunication Union defines cyberspace as the physical and
non-physical terrain created by and composed of some or all of the following: computers,
computer systems, networks and their computer programs, computer data, content data, traffic
data and users. Crime committed in cyber space maybe called as cyber crime. Sometimes, the
terms 'computer crime', 'computer-related crime', 'high tech crime', 'virtual crime' and 'cyber
crime' are often used interchangeably. Smith et al. (2004) have highlighted complexities 'Cyber
Crime' and have described it as conduct that involves the use of digital technologies. As per him,
Cyber Crime is incidental to the commission of other crimes. A broad definition of cyber crime
may be "a crime in which computer has been a target on which crime has been committed or
computer has been used as a tool to commit the crime". In a broader perspective, it would
cover crimes in which computers, networks and World Wide Web are involved.
Cybercrime as is any crime that is committed using a computer or networker hardware device
(Symantec, 2012). The United Nations Manual on the Prevention and Control of Computer-
Related Crime defines the following computer-related crimes in the following categories. (1)
fraud by computer manipulation, (2) computer forgery, (3) damage to or modifications of
computer data or programs, (4) unauthorized access to computer systems and service and (5)
unauthorized reproduction of legally protected computer programs (United Nations, 1990). A
workshop focussed on the issues of crimes related to computer networks, at the Tenth United
Nations Congress on the Prevention of Crime and Treatment of Offenders, classified cyber
crime into two categories- cybercrime in narrow sense and broader sense.
(a) Cyber crime in a narrow sense: Any illegal behavior directed by means of electronic
operations that targets the security of computer systems and the data processed by them.
(b) Cyber crime in a broader sense: Any illegal behavior committed by means of or in
relation to a computer system or network, including such crimes as illegal possession and
offering or distributing information by means of a computer system or network (UN2, 2000).
Based on the above discussion and numerous classifications, some of the important cyber-
crimes have been described below.
2.4.3 Hacking
Hacking is defined by many studies and classified as any unauthorized access to a computer is
defined as hacking. Hacking can be done very easily and depends on information access from
an organization. In this views if information is easily accessible and obtained in whatever way, a
hacker can steal, modify, block, delete or damage the information. Therefore, hackers can cause
loss to the information and organisation in the larger perspective. Hacking can be done in
several ways such as by stealing or obtaining the password by exploiting the vulnerabilities in
the computer network. Section 43 of the Indian Information Technology Act, 2000 defines a
number of acts, which are related to hacking (IT Act, 2000, Govt of India).
2.4.4 Cyber Frauds
Cyber fraud is intentional and deliberate activity concealing of facts. This induces impact on a
person to do or to omit to do certain thing, damages to him. Frauds could not have occurred had
he known the correct facts. There are many types of traditional frauds, which are now being
committed using digital and computer system. Therefore, frauds committed using computers are
called cyber frauds. It has been observed that cyber frauds account for nearly 1/3rd of all
cybercrimes. This includes credit card frauds after stealing credit card data, illegal fund transfer
after stealing passwords, etc.
Phishing is an activity which can harm to huge amount of information and has large implications
to an organization. Phishing includes which unsuspecting victims are sent fictitious E-mails
claiming to be from genuine sites to lure them to reveal their user ID, passwords, credit card
number. Literature review revealed that Phishing was known in developed countries for last
several years and this has now increased in India recently. Few examples include incidents
reporting at marketing companies M/s. Amazon, eBay, PayPal. Few banks have also witnessed
phishing attacks in the past. These attacks are now becoming sophisticated and are one of the
ways of committing identity theft in the cyber space.
There were at least 255,065 unique phishing attacks worldwide. This represents an increase of
over 10% from the 230,280 attacks we identified in 2015 (Global Phishing Survey, 2016). The
year 2005saw cyber frauds using an advanced technique, which is now called 'Pharming' in
which the account holder is directed to a bogus website even when correct address is typed and
confidential information is stolen. Pharming is usually achieved by poisoning or corrupting the
Domain Name Servers, which translate domain names to specific IP addresses. Unlike Phishing
where one person is tricked, each time, Pharming allows large number of users to be affected in
a single attempt.
It has been seen that India is also becoming a target of scams in last few years. Several versions
of such scams have been reported recently. Cybercrime has been reported as one of the top
economic crimes experienced by organizations in India out of the four economic crimes of
fraud, cyber-crime, bribery and corruption and asset misappropriation (PWC, 2016).
It has been observed that most of the malwares like viruses, worms and Trojan horses spread
through Emails. Nowadays organization face different types of malware and these are growing
problem of SPAM (unsolicited commercial mail). Thus, to protect organizations from malware
there is a need to have a proper E-mail filtering system in every organization.
Some of the most examples of malwares include Morris worm, Melissa virus, CodeRed, Nimda,
Netsky and its variants. These had caused damages to computers world-wide. In these recent
years, a new class of malware has been created where some of them are Adware, Spyware,
dialers, toolbars, pop-ups and hijackers.
Malware attacks continue to be the biggest threat to information security. As per the Computer
Crime and Security Survey 2010- 2011, there are 67.1% respondents reporting to (CSI, 2011).
During the year 2010, a highly sophisticated computer worm named "Stuxnet" was noticed,
which affected Programmable Logic Controllers (PLCs). PLCs are important part of Industrial
Control Systems (ICS) and also the part of Supervisory Control and Data Acquisition Systems
(SCADA). The worm affected systems in India are increasing day by day in its neighbouring
countries, Pakistan, Indonesia and Iran (Kerr et al., 2010). By September2010, it had affected at
least 45,000 industrial control systems around the world. This malware has started a new arms
race, and has created serious implications for the security of critical infrastructure worldwide
(Collins & Combie, 2012).
Mobile communication devices such as cell phones, smart phase and Personal Digital Assistants
(PDAs) are the latest to get affected by malwares. Increasing use of free applications by smart
phone users has brought another dimension to malware threats to cell phones. In these views, the
smart phones are particularly vulnerable to viruses due to their versatile communication
capabilitie, (Cheng et al., 2007). It has been also shown that smart phones are not adequately
protected against malwares (Cai et al., 2009).
It is often seen that even the most basic measures to deal with malware attacks such as installing
antivirus software, updating virus definitions and patching operating system and other software
are not taken by many organizations.
2.4.6 Denial of Service Attacks
In this kind of attack, hackers target computers such that they are not able to provide its services
to the end customers and users.
In the more advanced and deadly form of DoS attack, the hacker is able to compromise a large
number of machines anywhere in the world and install attacking software on them. These
compromised machines act like zombies and on the command of the hacker start attacking a
target system in unison, as shown in Figure 2.4. This attack is called DoS.
Example for this category of attack include Yahoo web portal where company was remained
inaccessible for three hours in year 2000. Similarly, other e-commerce portals viz Amazon,
Buy.com, CNN and eBay were also affected in their operations significantly. Yahoo, in this
context, suffered a loss of $5 million in these three hours. The combined loss in a week of all
major sites is estimated to be $1.2 billion. In the worst ever DDoS attack,' Cyber Bunker', a
Dutch firm targeted 'Spamhaus', a Geneva-based volunteer group resulting in slow down of
Internet (BBC, 2013).
2.4.7 Identity Theft
Identity theft may be described as stealing personal information related to the identification of
an individual or an organization. Such theft may include name, address, date of birth, social
insurance or security numbers, health card number, driving licence, bank PIN, Permanent
Account number and the most valuable of all, credit card numbers. This information is later
used to commit fraud. Under Sec. 66A of Indian Information Technology (Amendment) Act,
2008, identity theft has been defined as fraudulently, loss of password or any another unique
identification feature of any other person. Bengaluru city in the Karnataka State, has seen major
of cyber crime with identity theft, impersonation taking up majority of reported cases.
Here, most complaints registered in Bengaluru have been of cheating through imitation. Falling
under Section 66D of the Information Technology Act, 574 such cases were filed in the city in
2015. It is seen that the next biggest offence was identity theft. As many as 336 such cases were
filed under Section 66C of the Information Technology Act (Indiaspend, 2017).
Eloff and Eloff (2003) have suggested a holistic approach to information security management
(ISM). It refers to the structured process for the implementation and ongoing management of
information security in an organization. Figure 2.5 highlights an framework for ISO/IEC
27001:2005 Information Security Management System.
Rashmi Anand, University of Lucknow 26
Figure 2.5: ISO/IEC 27001:2005 Information Security Management System
At the root of the need for information security management lies in the importance of
information as a business asset. The basic aim of ISM is to protect information and IT resources,
its underlying aim is to ensure the continuity of the organizations (Vermeulen and Solms, 2002).
Figure 2.6: PDCA Cycle on Information Security Management
An ISMS is designed to ensure the selection of adequate and proportionate security controls that
protect information assets, also provides confidence to interested parties (ISOIIEC 27001:2005).
The standard follows a process approach for information security management and adopts a
"Plan-Do-Check-Act" (PDCA) model as shown in the Figure 2.6.
Since long time, it has been observed that information security issues have not been taken
seriously. The issues have been reporting by various international organisations in their data
bases and reports. It has been more than a decade, organizations globally now are investing in
infrastructure but lagging in implementation, measurement and review of security and privacy
policies (Annual Global State of Information Security Survey, 2007).
Therefore, management needs to pay more attention to information security issues (Dhillon and
Backhouse, 2000; Kankanhalli et al., 2003). The study of biometrics in banking security in New
Zealand, found that unauthorized access attempts by internal staff or external partners
constituted 34% to 50% of the security breaches (Venkatraman and Delpachitra, 2008). This
study also make effort for coping with a technology changes, a risk management strategy should
address the issues related to ethical and social area.
In view of managing the information, Mouratidis et al. (2008) has studied perception of persons
of authority in the management. Their study has justified the claims that personnel from general
management have different perspectives towards network security than personnel from the
network security management. The study of ISM from economic perspective, reveals the fact
that the realization of information security inside organizations is a problem of economic co-
operation among individuals (Pallas, 2009).
Hagen et al. (2008) in this context, the authors have studied the implementation IS measures in
various types of organisations. The authors have estimated effectiveness in select organizations.
They have also suggested organizational information security measures into four major
categories:
a) Security policy indicated strategies, the planning work before organization's IS approach
and represented by a written document directly linked to the overall strategic objectives
of the company.
b) Procedures and controls comprises of set of documents indicating individual and
organizational behaviour.
c) Administrative techniques that are both pro-active and reactive and involves asset
classifications, risk analysis, audits , and incident reporting systems in an organisation
d) Development and maintenance of IS based awareness programme including which
includes both types of activities at individual and collective levels.
In view of information systems, the authors have talked about IS based system approach, the
theoretical approach suggests that developing and maintaining a comprehensive set of system
theory. The theory describes IS mechanisms and the effects of boundaries, regulators those will
enable security architects to examine entire system (Conklin and Dietrich, 2008). This theory
may help in assisting the understanding of complex security appliances that are comprised of
different kinds of independent devices.
Literature shown many studies with IS, and organization interface. These studies are related to
IS aspects where importance of information loss to top management is reflected, moreover,
found related to commitment, identification and classification of information assets, providing
organization and resources for information security functions, allocation of responsibilities,
laying policies and procedures, training and awareness and inculcating a culture of security.
While exploring the subject area on human aspects of study, and organizational and
technological factors, Werlinger et al. (2009) have given low priority to organizational
challenges of security. In this following sub-section these aspect have been studied.
Referring to the draft ISO Guidelines under the section 83 (2011), which highlights that top
management roles and responsibilities stating they must demonstrate its commitment. Bjorck
(2001), in his study has also explore top managements’ commitment as one of the six important
parameter of IS in the context of Swedish organizations. In a kind of studies, finding were
reported by the authors Kankanhalli et al. (2003) in small and medium-sized, Singaporean
enterprises Abu-Zineh (2006) in Jordan. Authors Von Solms (2006) and Saint-Germain (2005),
all have also clearly mentioned that role of top management commitment, as the important
component in governance of corporate security. In order to implement the standards and policy
at user’s ends, top management support is also essential for the allocation of resources (Avolio,
2000). Information security must be understood from the top down (Harris, 2010). Strong top
management support is critical to information security management (NIST, 2008 A; Knapp et
al., 2006; Wright, 2008; Hagen et al., 2008). It has been observed that top management still are
Sometime studies defines the information which satisfies the definition of an asset, This
definition is more important than having influence of information on employee or customer,
which all three are commonly referred to in the literature as intangible assets. Sometimes, the
information is defined as an intangible asset like brand, not a physical asset with relevant set of
attributes. It is associated with having service potential and being able to give economic benefits
to organizations. However, information as a resource was not widely covered in literature earlier
(Hawley, 1995).
IS policy is a plan, outlining what kind of critical assets an organisational keeps and how they
must (and can) be protected. The main purpose of policy documents is to provide staff with a
brief overview of the “acceptable use” of any of the information assets. Thus, engaging assets to
secure critical systems of an organisation (Danchev, 2003). Sometimes the definition of IS
policy- is an organizations statement defining the rules and practices that regulate how it will
provide security (Khare and Srivastav, 2008).
In view of the author Hone and Eloff, the primary objective of an IS policy is to define the rights
and responsibilities of various users, so that they can pros and cons aspects of its behavior while
In views of the various definitions given by many authors and organisations on IS policy, the
information security policy shall fulfil following criteria:
IS policy should be protecting people and information. Later it can target to setting the rules for
expected behaviour by user. These users include system administrators, management and
security personnel, followed by authorizing security personnel. The users should also be
responsible for monitoring and investigating. Not only these, IS policy then should be defining
and authorizing the consequences of violation, and should seek approach to minimizing risks in
the organisations. Overall, the objectives of an IS Policy should be aligned towards tracking
compliance with regulations and legislations in organisations.
Moreover, IS policy is one of the important control defined in the international standards to
manage the information. Referring to the aspect of controls, according to ISO 27001:2005, IS
policy provides management direction and support for information security in accordance with
business requirements and objectives. Moreover, works towards relevant laws and regulations.
Top management should set a clear policy direction, in line with business objectives and
demonstrate support for commitment. However, compliance of an IS policy is difficult similar to
its development and implementation across the organization. At user’s perspectives in
organisations, IS policy can provides a basic framework, which must be followed by all
employees. Thus, it can be said that ISP defines both employee as well organisational attitude to
information, and is to be protected from unauthorized access, modification, disclosure and
destruction (Peltier et al., 2005). The overall main of IS policy is to create a shared vision and an
understanding of how various controls will be implementation for a safe organization (Dhillon,
2006).
2.5.1.5 Physical and Environmental Security of Organization
Physical and environmental security relates to measures taken to protect systems in physical
sense. For example, to protect buildings and related supporting infrastructure against threats
associated with their physical environment. These measures and guidelines are necessary to
protect the facility housing system resources (NIST, 1996). Organiations concerns are attach to
protecting their systems and computer resources, which they need physical protection from
unauthorized access and theft, sometimes threat to disasters such as fire, flood, earthquake,
environmental hazards, etc. (ISOIIEC 27001 :2005; ISOIIEC 27002:2005). In terms of
protecting the physical aspects of systems, protection include fences, walls, security guards,
cameras, intrusion detection systems and alarms, protection from electromagnetic radiations,
uninterrupted power supply, proper temperature and humidity controls (Trcek, 2006).
However, despite the fact that many organizations make use of a high number of technical
security controls. But faces breaches with increasing severities. This generally happens because
information security is primarily a human factor problem that remains largely unaddressed in
most of the organisations. Thus, the aspect of human factor in IS could be in the form of
employees, customers, clients, vendors, etc. (Hinson, 2003).
Few studies found where, all three elements people, process and technology, are all needed for
IS (Merkow and Breithaupt, 2006). In this context, Information Systems Audit and Control
Association (ISACA), highlights the linkages between the elements people, process and
technology in an organization. The interaction and linkages of elements in the organisational
perspective has been given in the Figure 2.8 (ISACA, 2009).
Referring to another kind of study on same aspect of IS, human factor sometimes is the weakest
and sometimes easiest link for a hacker, which increase possibilities of breach of Internet
Communication Technologies (ICTs) system (Mitnick, 2003; ITU, 2009). In the interest of
protecting the information, human can be enabled through various social engineering
techniques. Doing so it becomes easy to tell people about confidential information or do certain
things, which they would otherwise not do. In one of the research done by AI-Wahaibi et al.
(2011), the authors have shown that human factors which have significantly influenced success
or failure of solution to IS.
Recognizing the need to strengthen the cyber security ecosystem in India and in light of the
recent cyber attacks, Ministry of Electronics and Information Technology (MeitY), Government
of India has started Cyber Surakshit Bharat initiative with the increased focus on cyber safety.
The purpose of the program is to spread awareness, build capacity as well as enable government
departments aware of steps to be taken to create a Cyber Resilient IT set up.
Basically, lifecycle of information security awareness and training program has four steps- such
as identifying training needs, developing a training plan to suit the needs, adequate funding and
resources for training, implementing the training and improving the training program based on
the feedback (NIST, 2003). In general, awareness activities should be completed before the
training activities. Moreover, awareness should simply focus attention on IS. In the reference to
information security, awareness is a blended solution of activities that promote security,
establish accountability and inform the work force of security news within the organisations.
Rashmi Anand, University of Lucknow 40
Awareness activities also look at attention on set of issues; sometimes it is a program that
continually pushes the security message to users in a variety of formats (NIST, 2006). In view
of differentiating two activities, the most important difference between training and awareness is
that training seeks to teach skills that allow a person to perform specific function, while
awareness aims to set of issues. Sometimes trainings are imparted based on the roles and
responsibilities of the employees and users, middle and upper management for the specific needs
of IS in their organization (NIST, 2006).
One of the study on importance of IS awareness brought out that global citizens react differently
to IS awareness due to differing cultures across the boundaries and differing organizational
objectives. The study recognises that awareness and training are placed on individualism (Chen
et al., 2008). In the context of India, which has different culture and individualism than that
existing in western developed world, Qing et al. (2007) points out that IS awareness programme
are important approach towards educating users to protect organizations. In one of the similar
kind of study, Puhakainen (2006) has indicated that user compliance with IS security policies is
a multi-faceted construct that, in addition to knowledge and skills, relates to motivation. Hagen
et al. (2008) have found that the effectiveness of IS awareness is least implemented but on
contrast is a most effective measure of IS management. Differentiation of the same, authors have
arrived by comparing other technical-administrative measures such as policy, procedure, control
and administrative tools.
Von Solms (2000) has also recognised importance of awareness in the third wave of IS, i.e. in
the institutionalization wave. IS based news-letter, help-desk, web-portal, slogans, posters,
seminars, conferences, film-clips, games, classroom training with case studies, etc., all could be
some of the ways of supplementing activities related to awareness and training. The entire
efforts for the same can be wasted if its quality and effectiveness is not measured by top
management of organisations. Adequate budget and other resources must be allocated for the
Rashmi Anand, University of Lucknow 41
purpose of training. Recognizing the importance of awareness and training, the National Cyber
Security Policy of Government of India released in 2013 has also given equally consideration to
comprehensive national awareness program.
Handling a disaster and recovering from an information security breach incident are integral
parts of information security management. Organizations must establish, maintain and
effectively implement these plans for emergency response, backup operations and post-disaster
recovery for organizational information systems. This will ensure the availability of critical
information resources and continuity of operations in emergency situations (NIST, 2006).
ISOIIEC 27001:2009 advocates an effective information security incident management process
along with an effective business continuity management approach. ISOIIEC 27002:2005 also
highlights the business continuity aspects of information security management.
Legal and regulatory provision of IS has been specified by Indian by means of Section 43A of
Indian Information Technology (Amendment) Act, 2008. The act has provisions of
compensation for employees and users if organization looses their personal information. At the
user end, compliance to legal provisions has become mandatory provisions, but is a critical
Rashmi Anand, University of Lucknow 43
driver for organizations to take adequate security measures (Mcaffee, 2011; Symantec, 2011). In
view of these, apart from the mandatory provisions, organizations follow many security
standards such as ISO/IEC 27001:2005, COBIT, and SANS Controls, etc. These legal
provisions are laws and standards are also a driving force for organizations to bind exiting IS
measures and new initiatives in organisations. In this view regulatory laws are a big driver for
IS management in an organization (Berends, 2007).
In this section deal with ISO/IEC 27001 and 27002, both kind of standards have their roots from
BS 7799: Since 1995 the British Standard Institution (BSI) established BS 7799-1 standard titled
“Information security part I: Code of practice for security management” and added in 1998 a
second part, BS 7799-2 “Information security part II: specification for Information Security
Management System (ISMS)”. BS 7799-2 is a set of requirements for developing an ISMS that
encompasses people, processes and IT systems. Both aforementioned BS standards were taken
up by the ISO (International Organization for Standardization) to become global ISMS
standards:
BS 7799-1 was re-published in 2000 as ISO 17799 and renamed ISO/IEC 27002 in 2007;
BS 7799-2 became ISO/IEC 27001 standard in 2005.
ISO/IEC 27001 can be viewed as an overall program that combines risk management, security
management, governance and compliance, all together into on standards. The standard an
organization and ensures right people, processes and also technologies, all are in well placed.
The placement is done so that elements are appropriate to the business model and facilitate a
proactive approach to managing security and risk. The standard also promotes strong values of
client and business information and responds to business needs in establishing comprehensive
ISMS policy. Implementing these, the standard allows not only harmonization of IS-related
organizational processes, but also certification, thus establishing a common reference point for
the certified organization in the global market.
ISO/IEC 27002 “established guidelines and general principles for initiating, implementing,
maintaining, and improving information security management within an organization”. The
actual controls listed in ISO/IEC 27002 are intended to address the specific requirements
identified via a formal risk assessment. The standard is also intended to provide a guide for the
development of “organizational security standards and effective security management practices
and to help build confidence in inter-organizational activities”.
There is a specific difference between ISO/IEC 27001:2005 and IS0/IEC 27002:2005. In the
context of certification, ISO 27002 is not a management standard so certification against ISO
27002 is not possible. Management standard defines how to run a system, whereas ISO/IEC
27001:2005, defines ISMS. Therefore, certification against ISO/IEC 27001:2005 is possible. In
addition, this IS based management system looks at planned system and should be implemented,
A second success factor is related to IS management should become part of the management
structure of the organization. Involvement of management should no longer be regarded as
solely an IT issue (Vermeulen & von Solms, 2002). Thus, IS implementation approach should
be consistent with the organization’s culture (Hone & Eloff, 2002; Saint-Germain, 2005) and as
stated by von Solms & von Solms, “one way to ensure that employees actions, behaviors,
artefacts and relations are according to company policies is to align these with company
culture” (2004, p. 79). In addition, standards and certifications constitute important drivers as
“an information security culture emerges where specific behavior is encouraged, such as
complying with ISO 17799” (Martins & Eloff, 2002, p. 207).
In order to maintain and build up the better information security culture, it is important to
provide a proper training to the employees (Saint-Germain, 2005; Von Solms & Von Solms,
2004), which constitutes another success factors. The IS policies derived from standards must be
well aligned for a safe organisation and must be implemented towards corporate objectives
(Saint-Germain, 2005), moreover tailored to the organizational and its context (Doherty &
Fulford, 2005) and then rigorously enforced.
The third success factor is identified through the literature review, the factors related to the use
of a governing system. The system should ensure timely update of IS policies as well as wide
collaboration, and knowledge-sharing in the interest of an organisation (Saint-Germain, 2005).
Therefore, from these issues, this is noticed the important role played by the employees in the
successful implementation of SI standards. Therefore, it becomes necessary to study their
behaviors and their adoption of information security practices.
The aspect of responsibility in the definition of IS policy is very important. In this context,
Higgins (1999) notes, “without a policy, security practices will be developed without clear
demarcation of objectives and responsibilities”. The objective of an IS policy is “to provide
management direction and support for information security” (BS 7799). Organisation should
keep reviewing their objective for short and long term periods and these objectives should be
consistent with those advocated by many studies and researchers. For example, the literature on
IS suggests that policies should be developed from ISMS standards and guidelines (Gaskell,
2000).
A policy is typically described as a set of basic principles and guidelines, formulated and
enforced by top management of an organization in order to achieve a certain goal. Policy
prescribes the aims, objectives and the targets that need to be used to achieve the goals (Sushil et
al., 2006). Information Security Policy is an aggregate of directives, rules and practices that
prescribe how an organization manages, protects and distributes information (NIST, 2006).
Hong et al. (2006) define information security policy as the set of rules set-up for the use of
information assets and the statement set-up for the security priorities to achieve organizational
objectives.
Danchev (2003) defines information security policy as a plan, outlining what the company's
critical assets are and how they must be protected. The main purpose of IS policy is to provide
staff with a brief overview of the “acceptable use”. The use could be related to any of the
information assets, thus engaging them in securing the organisational critical systems. In
The primary objective of an IS policy is to define the rights and responsibilities of various users,
so that they understand acceptable and unacceptable behavior (Hone and Eloff, 2002). A well
defined policy reduces ambiguities and highlights top management’s commitment. Diver (2006)
has given following purposes, which an information security policy should fulfil:
a) Protect people and information.
b) Set the rules for expected behavior by users, system administrators, management and
security personnel.
c) Authorize security personnel to monitor, probe and investigate.
d) Define and authorize the consequences of violation.
e) Define the company consensus baseline stance on security.
f) Help minimize risk.
g) Help track compliance with regulations and legislation.
According to ISO 27002:2005, IS policy provides management direction and support for
information security in accordance with business requirements and relevant laws and
regulations. Management should set a clear policy direction, in line with business objectives and
demonstrate support for and commitment to, information security through the issue and
maintenance of an information security policy across the organization.
The policy provides a basic framework, which must be followed by all employees. Information
security policy defines the organization's attitude to information, announces internally and
externally that information is an asset, the property of the organization, and is to be protected
from unauthorized access, modification, disclosure and destruction (Peltier et al., 2005). The
purpose of the security policy is to create a shared vision and an understanding of how various
controls will be used such that the data and information is protected in an organization (Dhillon,
2006).
In this context, standards are important for policy development. Through standards guidelines
and procedure users in organisations influence and get motivated about actual benefits to them.
But sometimes, a standard provide high performance to achieve and becomes crucial to follow.
While studying the interplay among human, organizational and technological factors, Werlinger
et al. (2009) have found that the organizational challenges of security have a low priority.
2.7.5 Policy Development Issues in Indian Organisations
Many organizations today have implemented various security controls and measures to ensure
the effective working of information security (Karyda et al., 2005, Hong et al., 2006 and Hagen
et al., 2008). One of these major mechanisms is information security policy which is a direction-
giving document for information security within an organization (Hone et al., 2002). Existing
literature suggests that the development of an information security policy is a necessary
foundation of organizational security programs in protecting them against the increasing levels
of security attacks from internal and external sources (Hong et al., 2006 and Knapp et al., 2009).
However, many organizations face difficulty on putting this document together particularly as to
what constitutes a policy and what it should look like (Hone et al., 2002 and Knapp et al., 2009).
In addition, literature suggests that the formulation of an effective security policy in an
organization is a multifaceted task (Knapp et al., 2009). Similarly, according to Karyda et al.
(2005), development of such policy is not a straightforward task which consequently depends on
many factors. In fact, various international standards such as ISO/IEC, COBIT, BS7799, all are
widely available to provide guidance and requirements for writing an effective information
security policy.
• Asset Management
• Physical and environmental Control
Technical • Technical Operations
• System Acquisition, Development
level and Maintenance
• Incident Management
• Business Continuity Plan
• Disaster Recovery Plan
User Management
Figure 2.11: The Initial Design of the Proposed ISG Framework
In view above, Figure 2.11 presents design of proposed ISG framework. The ISMS based PDCA
cycle consists of four phase. In the First, PLAN phase, where the ISMS’s scope is define, policy
is developed, risk assessment is conducted, as risk assessment, treatment strategy is determined,
security objectives and controls are selected, and selected controls are justified against risk
assessment (statement of applicability).
Figure 2.12: Main components of Organization Security Level
(Source: Munirul Ula1et al., 2011)
In the second phase called, DO Phase, where preventive plans are implemented, security control
are actually operated and security incidents are promptly detected and responded. Third phase
classified as CHECK, where checks are made to ensure that security controls are firmly in place
and are achieving goals, residual risk level are reviewed, security process are reviewed, metric
for evaluation are determined, and monitoring and response capacity is checked. In this phase,
learning from others, such as CERT, is done, an ISMS audit is conducted, and a management
review is executed. In the last ACT phase, where actions are taken to correct, prevent and
improve (e.g. improvement of security processes refinement of risk mitigation plans,
development of new policies and refinement of existing policies and design and implementation
of new security controls).
The main components of organizational security level are presented in Figure 2.12 and 2.13.
As per the ISACA, information security is not only a technical issue, but also a business and
governance challenge (ISACA, 2006). If other than technical issues, all other areas of
information security are explored and considered, then only an effective policy can be designed.
Management dimension to information security has been added in literature only in the last few
years. Organizational aspects of information security have also started receiving attention
recently. Most of the available literature focuses on the developed nations and very little India
specific literature and research data is available.
From the above, it has been observed that subject of management of information security policy
in Indian organizations, both in Government and private sectors, has not been studied
adequately, specifically from the angles of ISMS practice and IS policy implementation point of
view. Such kind of study is required and inspired researcher to carry out in the current form of
the research. From the literature review, it is observed that even though factor influencing IS
policy have been presented but the impact ISMS practice and ISP implementation has not
received adequate attention Indian context. As observed, there exists wide research gaps for
Indian organizations using IT or ITES about the cyber security environment in them, threat
perception, risk management, practices adopted to deal with cyber threats, financial losses
incurred by them, etc. Research gaps in information security policy focused on security
standards implementation in India, as compared to advanced countries have not been studied.
There is a lack of studies in Indian context that predicts policy trends in IS policy scenario in
coming couple of years in the country. In such case, adequate planning and preparations to deal
with the situation can’t be done properly in advance.
In addition to above gaps, this has been also observed that, the field of information security and
policy related issues are complex and multi-disciplinary. The issues need focused management
approach to manage the information from all dimensions and research must be taken into
account to ensure a proper and secure environment for an organization’s information assets
(Von Solms and Von Solms, 2004). The discipline of information security is evolving to keep
pace with new challenges of crimes and emerging threats in a technologically fast changing
environment of Indian economy and changes happening at organizational levels. The
dependence of national security on protection of its critical information infrastructure, many of
which are in private hands, is increasing and hence there is a need to evolve an assessment
framework for information security policy in Indian organizations from the national security
perspective as well. New research efforts seem to be required that minimize the gaps between
management and technical aspects of information security (Dlamini et al., 2009). Based on
theses, the current study focuses on a research on information security management practice
related to threats and breaches, and analyzes policies implementation at Indian organization. In
the nutshell, it can be said that, there is a further need to conduct research on the policy aspects
of information security, particularly in Indian context, so that Indian can move towards a safe,
secure and resilient information society.
Most of the Indian organizations found working on the learning path of adopting information
security measures in varying proportions. In this context, implementing policy for addressing
security related challenges, found very important. Further, a need of exploring organizations
from the angle of information security policy management was felt as one of the important
research gap in this field, particularly in the Indian context. Additionally, it is also observed that
the managerial, organizational and human aspects of information security with the policy
dimensions implementation have not been researched adequately. Thus it is imperative to study
the area and to investigate the relationships between IS factors which includes security controls
of ISO, and ISMS practices and IS policy implementation in the Indian context of organisations.
Therefore, based on the literature review, it can be concluded that there is strong need to carry