Sunteți pe pagina 1din 6

An integrated system theory of information security

management
Kwo-Shing Hong
Department of Management Information Systems, National Cheng-Chi University,
and Overall Planning Department, Control Yuan of Republic of China, Taiwan
Yen-Ping Chi
Department of Management Information Systems, National Cheng-Chi University,
Taiwan
Louis R. Chao
Institute of Management Science, Tamkang University, and Control Yuan of
Republic of China, Taiwan
Jih-Hsing Tang
Tak Ming College, Taipei, Taiwan
Keywords

Information systems,
Control systems,
Risk management,
Systems theory,
Contingency planning

Abstract

With the popularity of electronic


commerce, many organizations
are facing unprecedented security
challenges. Security techniques
and management tools have
caught a lot of attention from both
academia and practitioners.
However, there is lacking a
theoretical framework for
information security management.
This paper attempts to integrate
security policy theory, risk
management theory, control and
auditing theory, management
system theory and contingency
theory in order to build a
comprehensive theory of
information security management
(ISM). This paper suggests that an
integrated system theory is useful
for understanding information
security management, explaining
information security management
strategies, and predicting
management outcomes. This
theory may lay a solid theoretical
foundation for further empirical
research and application.

Information Management &


Computer Security
11/5 [2003] 243-248
# MCB UP Limited
[ISSN 0968-5227]
[DOI 10.1108/09685220310500153]

1. Introduction
Information is one of the most important
enterprise assets. For any organization,
information is valuable and should be
appropriately protected (BS 7799-2, 1999).
Security is to combine systems, operations
and internal controls to ensure the integrity
and confidentiality of data and operation
procedures in an organization. With the
advent of information technology, users'
roles in information systems have evolved
from IT specialists for access information
facilities, to non-IT personnel for regular
operations, to unspecified individuals from
outside. That is to say, with the serious
threat of unauthorized users on the Internet,
information security is facing unprecedented
challenges, and effective information
security management is one of the major
concerns (Eloff and Solms, 2000; Schultz et al.,
2001).
Although there is plenty of security
technology research, surprisingly few
information security management studies
are found in the literature. It wasn't until
1995, when the British Standard Institution
(BSI) established BS7799-1, ``Information
Security Management Part I: Code of
Practice for Information Security
Management'', that a more complete
management framework for information
security emerged. Because of the lack of
information security management theory,
there are few empirical studies conducted to
examine the effectiveness of management
strategies and tools. Thus, the authors would
like to combine five related theories
information policy theory, risk
management theory, control and audit
theory, management system theory, and
contingency theory to develop an integrated
theory of information security management
(ISM) which may be used as a foundation for
The Emerald Research Register for this journal is available at
http://www.emeraldinsight.com/researchregister

further understanding managerial obstacles,


predicting managerial effectiveness and
modifying managerial strategies.

2. Literature review
2.1 Definitions and coverage

To begin with, information security is open


to many definitions. For example, the goal of
information security is mainly to detect and
prevent the unauthorized acts of computer
users (Gollmann, 1999). And the broad
objectives of a computer security policy are
to ensure the data confidentiality, integrity
and availability within information systems
(ISO/IEC 17799, 2000; Schultz et al., 2001;
Smith, 1989). Information security issues
cover information security policy, risk
analysis, risk management, contingency
planning and disaster recovery (Von Solms
et al., 1994). From users' perspective, if
software runs smoothly as they expect, the
system will be described as ``a secure system''
(Simson and Gene, 1991). Therefore,
information security is defined in this paper
as to apply any technical methods and
managerial processes on the information
resources (hardware, software and data) in
order to keep organizational assets and
personal privacy protected.
Information security management
contents also vary with different researchers
and institutions. For example, according to
Tudor (2001), there are five components for
any information security architecture:
1 security organization and infrastructure;
2 security policy, standards and procedures;
3 security baselines and risk assessments;
4 security awareness and training
programs; and
5 compliance.
Among these, security organization and
infrastructure is essential and crucial for
information security management. However,
The current issue and full text archive of this journal is available at
http://www.emeraldinsight.com/0968-5227.htm

[ 243 ]

Kwo-Shing Hong, Yen-Ping Chi,


Louis R. Chao and
Jih-Hsing Tang
An integrated system theory
of information security
management
Information Management &
Computer Security
11/5 [2003] 243-248

ISO/IEC 17799 gives a different scope for


information security management. It
includes:
.
information security policy establishment
and assessment;
.
information security organization and
responsibility;
.
personnel security management and
training;
.
computer system security management;
.
network security management;
.
system access control;
.
system development and maintenance
security management;
.
information assets security management;
.
physical and environment security
management; and
.
business planning and management.

2.2 Security policy theory

There is no consistent security policy theory


so far. However, several scholars declare that
information security could be achieved
through the establishment, implementation
and maintenance of information security
policy. For example, Kabay (1996) pointed out
that the establishment of information
security policy should include five
procedures, which are:
1 to assess and persuade top management;
2 to analyze information security
requirements;
3 to form and draft a policy;
4 to implement the policy; and
5 to maintain this policy.
The information security policy life cycle
proposed by Rees addressed four parts:
1 policy assessment;
2 risk assessment;
3 policy development and requirements
definition; and
4 review trends and operation management
(Gupta et al., 2001).
The e-policy proposed by Flynn (2001) covers:
.
comprehensive e-audit;
.
e-risk management policy;
.
computer security policy;
.
cyber insurance policy;
.
e-mail policy;
.
Internet policy; and
.
software policy.
To sum up, information security policy aims
at planning information security
requirements, forming consensus in an
organization, drafting and implementing a
policy, and reviewing the policy on a regular
basis in order to meet the demands of
organizational security requirements. This
theory could be expressed in terms of three
functions below:
1 Information security = f (information
security policy).
2 Information security policy = f
(establishment, implementation, and

[ 244 ]

maintenance of information security


policy).
3 Information security establishment = f
(organizational security requirements).

2.3 Risk management theory

Risk management theory suggests that


through organizational risk analysis and
evaluation, the threats and vulnerabilities
regarding information security could be
estimated and assessed. The evaluation
results could be used for planning
information security requirements and risk
control measures. The goal is to make
information security risk under an
acceptable level in an organization.
Wright (1999) pointed out that risk
management is a process of establishing and
maintaining information security within an
organization. The crux of risk management is
risk assessment; namely, through
information security risk assessment, an
organization could take appropriate
measures to protect information
cost-effectively. Reid and Floyd (2001)
proposed a ``risk analysis flow chart'', and
considered that an organization should
assess the threats and vulnerabilities of its
information assets. The goal of
organizational controls is to lower the risk to
an acceptable level.
The interplay of risk assessment and risk
control makes information security risk
under an acceptable level, and actualizes the
control procedures. Therefore, the
relationships could be expressed as follows:
.
Information security = f (risk assessment,
risk control, review and modification).
.
Risk assessment = f (risk analysis, risk
estimation).
.
Risk control = f (establishment of control
measures, implementation).
.
Risk analysis = f (threats, vulnerability).
.
Risk estimate = f (impact, asset appraisal).

2.4 Control and auditing theory

Control and auditing theory suggests that


organizations should establish information
security control systems; and after being
implemented, auditing procedures should be
conducted to measure the control
performance. Several researchers consider
information security management as a part
of control systems. For example, Weber (1999)
regarded control as a system of preventing,
detecting and correcting illegal events; so
there are preventive control systems,
detective control systems and corrective
control systems. ISO/IEC 17799 for
information security control includes:
.
security policy;
.
organizational security;
.
assets classification and control;
.
personnel security;
.
physical and environmental security;

communication and operation security;


access control;
system development and maintenance;
business continuity planning; and
compliance.

Kwo-Shing Hong, Yen-Ping Chi,


Louis R. Chao and
Jih-Hsing Tang
An integrated system theory
of information security
management

Information Management &


Computer Security
11/5 [2003] 243-248

COBIT is an IT management model, which is


based on two major internal control models:
``holistic operation control model'' and ``focus
on information technology control model.''
COBIT is a high-level guideline for IT
resources, including data, applications,
techniques, hardware and personnel. It
achieves organizational objectives through
balancing the risk, and directing and
controlling measures (COBIT, 1998).
Organizations should refer to information
security standards and establish information
security strategies in order to form IT
security control systems; and through the
implementation of these control systems,
information audit should be done regularly
in order to assess control performance. In
terms of control systems, information
security is determined by the following
functions:
.
Information security = f (establishment of
control systems, implementation of
control systems, information audit).
.
Establishment of control systems = f
(security strategies, security standards).

.
.
.
.

2.5 Management system theory

Management system theory emphasizes that


an organization should establish and
maintain a documented information security
management system (ISMS) to control and
protect information assets. ISMS include six
steps:
1 define the policy;
2 define the scope of ISMS;
3 undertake a risk assessment;
4 manage the risk;
5 select control objectives and control to be
implemented; and
6 prepare a statement of applicability
(BS 7799).
Based on the organizational requirements
and security strategies, Sherwood (1996)
proposed information security architecture
SALSA (Sherwood Associated Limited
Security Architecture) which includes:
.
business requirements;
.
major security strategies;
.
security services;
.
security mechanism; and
.
security products and technologies.
Organizations should inspect the
environments and security standards to
establish an information security policy,
define the scope of information security and
assess the risk and control in order to form
an information security management system.
Information security could be described in
the following functions:

Information security = f (information


security policy, the scope of information
security, risk management,
implementation).
Risk management = f (risk assessment,
risk control).
Information security policy = f
(environment inside and outside of an
organization, standards).

2.6 Contingency theory

For contingency theorists, information


security management is a part of contingency
management that is meant for the
prevention, detection and reaction to the
threats, vulnerabilities and impacts inside
and outside of an organization. To meet the
demands of a fast-changing environment, it is
reasonable for practitioners to take on one or
more information security management
measures, for example security policy
actions, risk management actions, control
and auditing actions or system management
actions, or to combine two or more of these
actions. Contingency approach is to
recognize and respond to situational
variables in order to attain organizational
objectives effectively (Drazin and Van de
Ven, 1985; Robbins, 1994). Contingency
management is to manage the interaction
between a set of environmental variables and
another set of technological and managerial
variables, and the goal is to strive for the
attainment of organizational objectives (Lee
et al., 1982; Luthans, 1976).
Contingency approach has been applied to
information security management. For
example, Von Solms et al. (1994) proposed an
information security model (ISM) which
consist of five information security levels:
1 ideal;
2 prescribed;
3 baseline;
4 current; and
5 survival.
Except for the ideal level, all the other four
levels are dynamic and contingent upon
environmental variables such as information
security threats, vulnerabilities and impact
for an organization.
The procedures for coping with
organizational information security
problems are most undefined since the
procedures are dependent upon several
situational variables. Therefore, to take on
policy-oriented managerial activities or risk
management activities is dependent upon an
organization's contingency strategy. The
contingency approach could be expressed in
the following functions:
.
Information security = f (information
security strategy).
.
Information security strategy = f (policy
orientation, risk management orientation,

[ 245 ]

Kwo-Shing Hong, Yen-Ping Chi,


Louis R. Chao and
Jih-Hsing Tang
An integrated system theory
of information security
management
Information Management &
Computer Security
11/5 [2003] 243-248

control and auditing orientation,


management systems orientation,
contingency management).
Contingency management = f
(organizational environment,
management, technology).

All the mentioned theories are categorized in


terms of main security managerial activities,
managerial procedures, characteristics and
literature, and are summarized in Table I.

3. An integrated theory
3.1 The construction of a theory

Theory construction is a creative process; it


develops concepts, constructs and
propositions at the same time (Kaplan, 1964).
There are two paths to theory building: first,
knowledge growth by intention; that is to
refine and modify a theory within a
well-developed domain; and second,
knowledge growth by extension; that is to
strive for a more complete explanation in a
smaller-scale theory, and then extend to
similar domains. The attempt in this paper is
to take the second path, five different
theories relating to information security
could be analyzed and compared below.
First, security policy, risk management,
control and auditing theories take different
cutting points in the process or stage of
information security management. For
example, security policy theory takes its
perspective from the ``policy stage''; however,

control and auditing theory focuses on


defining the ``control stage''.
Second, although five theories adopt
different cutting points, the ``ongoing''
information security management activities
are similar. Internal control received special
attention in all theories. Obviously, internal
control is an important measure to attain
information security objectives.
Third, except for contingency theory, all
other theories are top-down process-oriented,
but do not have applicable procedures.
Fourth, the five mentioned theories
emphasize a component or some components
of information security management, but
none cover the entire scope of information
security management. Even the management
system theory is more general, but is not
comprehensive enough to cover all the
information security management. Here we
highlight some limitations of the current
theories:
.
The ``top-down'' approach may not be
consistent with reality.
.
It is hard for structured methods to adapt
to highly dynamic environments.
.
Information security auditing is not
appropriately addressed, thus no
evaluation mechanisms could be applied
accordingly.
.
Management systems could not form a
periodic cycle.
.
Contingency theory does not have the
previous four limitations, but it lacks
comprehensive methods and procedures.

Table I
Summary of information security management theories
Theory

Managerial activities

Managerial procedures Characteristics

Source

Security policy
theory

Security policy establishment


Security policy implementation
Security policy maintenance

Sequential
Periodic

Policy is the main focus


Emphasize sequential, structured procedures

Flynn
Gupta et al.
Kabay

Risk management
theory

Risk assessment
Risk control
Review and modification

Sequential
Periodic

Understand and cope with insecure


environments
Ignore security policy and information audit
mechanisms
Overemphasize structures

Luthans
Wright

Control and auditing Establish control systems


theory
Implement control systems
Information auditing

Sequential
Periodic

Internal control and information audit is the


main focus; ignore security policy and risk
management
Lack of requirements planning and
contingency for the unexpected

ISO/IEC
17799
COBIT

Management system Establish security policy


theory
Define security scope
Risk management
Implementation

Sequential

Information auditing is ignored and the


implementation is affected
Lack of periodic check
Lack feedback

BS7799
Schultz et al.

Contingency theory

Contingency

Consider environments both outside and inside


of an organization, and choose appropriate
security strategies
Lack of integration and structures

Drazin et al.
Kaplan
Lee et al.
Tudor

[ 246 ]

Policy strategy
Risk management strategy
Control and audit strategy
Management system strategy

Kwo-Shing Hong, Yen-Ping Chi,


Louis R. Chao and
Jih-Hsing Tang
An integrated system theory
of information security
management
Information Management &
Computer Security
11/5 [2003] 243-248

Based upon the above analysis, the current


theories related with information security
management are restricted to some parts of
the management activities or mechanisms,
and could not be applicable to all security
management activities, not to mention that
no one is adaptable to highly dynamic
environments. Therefore, this paper is
intended to integrate these five theories to
build a more solid and comprehensive theory
named integrated system theory (IST).

3.2 Description of the IST

The IST is based on contingency


management and integrates information
security policy, risk management, internal
control and information auditing theories to
form an Information Security Architecture
that is consistent with organizational
objectives, as shown in Figure 1.
The characteristics of this theory are as
follows.
First, this theory is based on contingency
management. To meet the demands of
fast-changing environment, any component
of managerial activities could be the focus. It
is not recommended here to put an emphasis
on information security only.
Second, sequential management processes
and contingency processes are combined in
this theory. The sequential processes
originate from security policy, and then to
risk management, internal control to
information auditing. Contingency processes
originate from any security management
activities, and then proceed sequentially. For
example, contingency management could
begin at risk management, internal control
and then information auditing, and go back
to security policy in the long run.
Contingency management could include one
or more management activities.

Third, the information security


management forms a managerial cycle
periodically. However, contingency
processes could be independent from other
managerial activities, or could form a cycle
periodically. The periodic feedback could go
back to the original information security
management process or any previous
managerial activities.
Fourth, each security managerial activity
could proceed in a sequential order or could
be an input/output of the next activity.
Last, each security managerial activity is
tightly coupled with organizational
objectives.
The theory could be expressed in the
following functions:
.
Information security = f (information
security policy, risk management,
internal control, information auditing,
contingency management).
.
Internal control = f (personnel security
control, physical security control, systems
and network security control, access
control, system development and
maintenance control, business continuity
management).
.
Contingency management = f
(environment inside or outside of an
organization, information management,
information techniques).
A theory could be evaluated in terms of its
scope, parsimony, accuracy of explanation
and the precision of prediction. If a theory
could produce a more accurate prediction or
explain more with fewer variables, then it is
a useful one. The IST proposed in this paper
is more comprehensive, practical and useful;
however, further empirical studies have to be
conducted to consolidate the theory.

Figure 1
A diagrammatical illustration of integrated system theory

[ 247 ]

Kwo-Shing Hong, Yen-Ping Chi,


Louis R. Chao and
Jih-Hsing Tang
An integrated system theory
of information security
management
Information Management &
Computer Security
11/5 [2003] 243-248

4. Conclusion
Organizations nowadays rely heavily on
information technology and information
security has caught a great deal of attention;
however, few information security strategies
and guidelines could be found for
practitioners. This may result from a lack of
coherent and comprehensive information
security management theory. The paper
integrates different perspectives from
security policy, risk management, control
and auditing, management systems and
contingency theories and builds an IST,
which may lay a more solid foundation for
further empirical studies. The contribution
of this study is as follows:
.
It provides rich information security
strategies, procedures and theories for
researchers, information security
decision makers, planners, providers and
users; thereby they can get a better
understanding of information security in
terms of different perspectives.
.
It explains organizational behavior
regarding information security
management, and provides alternatives
for organizational security management
strategies.
.
The theory proposed in this paper could
be applied to predict the organizational
attitudes and behavior towards
information security management, and
could be beneficial for information
security decision making.
.
The theory could be a building block for
further information security management
researchers and be a guidance of future
empirical studies.

References

BS 7799-2 (1999), Information Security


Management Part 2: Specification for
Information Security Management Systems,
British Standards Institute, London.
COBIT (1998), COBIT: Control Objectives, ISACA,
Rolling Meadows, IL.
Drazin, R. and Van de Ven, A.H. (1985),
``Alternative forms of fit in contingency
theory'', Administrative Science Quarterly,
Vol. 30 No. 4, pp. 514-39.
Eloff, M.M. and Solms, S.H.V. (2000), ``Information
security management: an approach to
combine process certification and product
evaluation'', Computers & Security, Vol. 19
No. 3, pp. 698-709.
Flynn, N.L. (2001), The Epolicy Handbook:
Designing and Implementing Effective E-mail,

[ 248 ]

Internet and Software Policies, American


Management Association, New York, NY.
Gollmann, D.(1999), Computer Security, John
Wiley & Sons, New York, NY.
Gupta, M., Charturvedi, A.R., Metha, S. and
Valeri, L. (2001), ``The experimental analysis
of information security management issues
for online financial services'', ICIS 2000,
pp. 667-75.
ISO/IEC 17799 (2000), Information Technology
Code of Practice for Information Services,
International Organization for
Standardization, Geneva.
Kabay, M.E. (1996), The NCSA Guide to Enterprise
Security, McGraw-Hill, New York, NY.
Kaplan, A. (1964), The Conduct of Inquiry,
Chandler Co., New York, NY.
Lee, S.M., Luthans, F. and Olson, D.L. (1982),
``A management science approach to
contingency models of organizational
structure'', Academy of Management Journal,
Vol. 25 No. 3, pp. 553-66.
Luthans, F. (1976), Introduction to Management:
A Contingency Approach, McGraw-Hill,
New York, NY.
Reid, R.C. and Floyd, S.A. (2001), ``Extending the
risk analysis model to include market
insurance'', Computers & Security, Vol. 20
No. 4, pp. 331-9.
Robbins, S.P. (1994), Management, 4th ed.,
Prentice-Hall, Upper Saddle River, NJ.
Schultz, E.E., Proctor, R.W. and Lien, M.C. (2001),
``Usability and security: an appraisal of
usability issues in information security
methods'', Computers & Security, Vol. 20
No. 18, pp. 620-34.
Sherwood, J. (1996), ``SALSA: a method for
developing the enterprise security
architecture and strategy'', Computers &
Security, Vol. 2, pp. 8-17.
Simson, G. and Gene, S. (1991), Practical UNIX
Security, O'Reilly & Associates, Sebastopol,
CA.
Smith, M. (1989), ``Computer security threats,
vulnerabilities and countermeasures'',
Information Age, Vol. 11 No. 4, pp. 205-10.
Tudor, J.K. (2001), Information Security
Architecture, CRC Press, Boca Raton, FL.
Von Solms, R., Van Haar, H., Von Solms, S.H.
and Caelli, W.J. (1994), ``A framework for
information security evaluation'',
Information & Management, Vol. 26 No. 3,
pp. 143-53.
Weber, R. (1999), Information System Control
and Audit, Prentice-Hall, Englewood Cliffs,
NJ.
Wright, M. (1999), ``Third generation risk
management practices'', Computers &
Security, Vol. 1999 No. 2, pp. 9-12.

S-ar putea să vă placă și