Ind Jour Math & Comp Sc. Jhs. Vol. II - Pt I, 2013 Pg 26-30
Information systems security: A review
Amit Kumar Jain1, Yashpal Singh2 and Sachin Updhyay3
1
NRCAF, Jhansi,2BIET, Jhansi, 3BU ,Jhansi
1
[email protected],
[email protected],
[email protected]
Recceived on 01/2/2012
forecasted that the non-IT portion would go up from current
10% to 40% by 2014.
Although business or non-IT components are
playing an increasingly prominent role in the security
model of an organization. The need to authenticate and
validate users is one of the top components of an
information security model. PKI (Public Key Infrastructure)
is one of the most important components of user
authentication and validation. Most security comes with
controls, and DO’s and DON’Ts. But it is important to
identify the right balance of security measures and controls
such that the right people access the right information at
the right time. However, Lewis (2000) pointed out that
achieving that balance is a challenge given the simple
dynamics of e-business, a system is required to serve
hundreds of thousands of end-users with potentially
diverse computer platforms and requirements.
ABSTRACT : The evolution of network-based computing
has caused information security managers rethink their
priorities and perceptions of risks. Studies have identified
that security was not considered to be a major issue in the
pre-Internet era, the early 1990s. But studies conducted in
the mid-1990s revealed that managers were beginning to
worry about open architectures and security issues posed
by networks. But by the end of the 1990s, security was
topping the list of major issues in IS. This change of
perception has drawn greater attention to this issue; and
this has eventually given birth to various IT control
requirements and industry Standards that largely govern
the process of security risk management today. The role of
technology is paradoxical when it comes to security.
Because, as seen earlier, technology is the one of the
primary causes for the majority of security risks. For
example, sophistication of technology adds to complexity
and a steeper learning curve; and the complexity leads to
oversights, thereby creating security holes. But
paradoxically, most people turn to technology once again
for solution to these security problems! Familiarity of the
technology and being informed of the latest developments
is one of the primary requirements of a security practitioner.
KEYWORD: network security/ information system
When does a security issue become a risk?
Technically, risk is the probability associated with
losses or (failure) of a system multiplied by the dollar loss
if the risk is realized (Straub and Welke, 1998). By this
definition, it is evident that risks are subjective. It is up to
the management to assess risks and to classify them based
on their severity. The economic aspect of managing risks
also plays a role in it, because sometimes the benefits from
mitigating a risk may not justify the costs involved. At the
same time, chances of occurrence of some risks may be less
than the others. In general, Straub and Welke’s definition
of risk can be used as a simple gauge of measurement.
What role does the network play in the security of
the information system? And how has the evolution of the
global network changed the security of information
systems?
A clear indication that security was not perceived
to be a serious issue before the advent of the Internet can be
seen Delphi study conducted by Society for Information
Management (SIM) in the United States on the key issues
in Information Systems Management. In the survey, SIM
institutional and board members were asked to consider
what they felt were the most critical issues facing IS
Security of networked information system
The need to accommodate more complex business
transactions over networks is changing the future of
information security models (Fonseca and Lee, 2001).
Security of an information system was considered to be a
technical issue to be handled by the IT department until
recently. But Fonseca and Lee reported (2001) that with the
increased interaction between security and e-commerce,
the line separating business and IT departments is
continuing to blur. Lindstrom, cited by Fonseca and Lee
(2001), states that “it’s not just security folks that go to
security conferences anymore; it’s e-business directors and
CIOs of pure-play businesses that want to be up to speed
about what infrastructures are doing security-wise.” A
Gartner Group report (Witty et al., 2001) also re-emphsized
this notion. The Gartner report estimates that about 90% of
the current security spending is IT-related; however, it is
26
Table 1 : Top five IS security issues (Fink, 1995)
executives over the next 3 to 5 years, they found security to
be of markedly lower priority, and decided to drop it from
the list of issues (Brancheau et al. 1996).
However, it is interesting to observe that another
study was conducted in Australia around the same time
specifically on security issues (Fink, 1995), probably
because security was considered to be a significant issue
in that part of the world. A convincing explanation for this
inconsistency in IS executives’ perceptions can be found
in another study (Watson, et al., 1997). Watson and his
team compare and contrast the findings of 10 information
systems management studies in 10 countries, and the SIM
Delphi study mentioned above. They discovered that the
possible reasons for these differences are cultural, economic
development, political/legal environment, and
technological status of these nations. According to recent
studies (conducted by Sisco) security is the biggest
challenge facing small and medium-sized businesses.
Ever-changing security threats from both inside and outside
the business network can severely impair business
operations, affecting profitability and customer
satisfaction. In addition, small and medium-sized
businesses must comply with new regulations and laws
formulated to protect consumer privacy and secure
electronic information.
Coming back to the point, the Australian Delphi
study (Fink, 1995) mentioned above was conducted to
identify key IS security issues by surveying IS managers of
the 198 largest companies operating in the Australian Stock
Exchange. The results of this study provided a ranking of
IS security issues in terms of their perceived importance in
the middle 1990s, as shown in Table 1.
A quick look at the results of the Top Five IS security
issues of the mid 1990s clearly indicate that the IS
executives were beginning to get concerned about the
security issues of open architecture and networks that
would become the Internet, and an organization’s
vulnerability to errors and crime that would become so
common by the end of 1990s. It is to be noted that there
were about 9 million Internet hosts by the end of 1995,
whereas the number of Internet hosts today stands well
over 100 million (ISC, 2000).
The open nature of the Internet provides an evergrowing list of vulnerabilities that every enterprise needs
to address. As companies move a greater percentage of
their revenues to Internet/e-business channels, the degree
of security risks increases and the number of controls
implemented rises.
The Gartner group estimates (Witty et al. 2001) that
in 1999, 75% of all enterprises were Internet-isolated. But
by 2004, they estimate that 80% of enterprises will be using
Rank
1
2
3
4
5
Description
Access Control: Controls need to be devised
to limit access to resources of a system only
to authorized persons, as the move to open
systems architecture has made this a
complex task.
Disaster Recovery: Organization need to
identify potential threats and have
procedures in place to overcome disasters,
when they occur.
Networks: Knowledge needs to be gained
on the complex security requirements of
networks.
Security Management: Deliberate
management action should be taken to
reduce the organization’s vulnerability to
disasters, errors, and crime.
Security Awareness: IS managers should
consider using marketing methods to raise
awareness of security issues.
the Internet as an integral part of their business processes.
In other words, this finding means that security risks of
using the Internet will be faced by 80% of all enterprises. It
was seen earlier that 85% to 90% of all businesses on the
Internet reported some form of security incident in 2000
(CSI, 2001, Fogarty, 2001; Gaudin, 2001; Veysey, 2001).this
finding reveals a potentially dangerous situation.
In other words, approximately 72% of all businesses
in world will be under threat of security risks by the next
three years from the Internet alone, unless adequate
measures have been taken.
IT Control Requirements
As vulnerabilities and risks associated with
Information Systems increase, corporates are faced with
an ever -longer list of controls to be implemented to protect
their businesses.
The seven IT control requirements needed to
adequately and comprehensively protect an enterprise are
defined as authentication, authorization, confidentiality,
integrity, privacy, non-repudiation and availability. The
Gartner Group identifies an eighth requirement titled
‘’Non-interference’’ that addresses someone trespassing
within an enterprise, which, for example, may be used as a
launch pad to another enterprise.
Table 2 below describes the eight IT control
requirements and possible security control tools currently
available for each of them.
27
Table 2 : IT Control Requirements
Requirement
Definition
Security Control
Ensure that
control is
exercised over
the entry and
use of an
enterprise’s
electronic
assets.
§ User ID/
Password
§ Firewall
§ Nondisclosure
of Passwords
Authentication
Ensures that
users and
applications
appropriately
identified before
gaining access
to information
assets.
§ User ID/
Password
§ Token
§ Biometrics
Device
§ PKI
Credentials
Authorization
Ensures that
a properly
authenticated
user/application
can access only
those IT
resources to
which the
information
owner has
given approval.
§ Access
Control List
§ Attribute
Certification
Confidentiality
Ensure that only
those people
who have a
need to see
information are
able to see it.
§ Encryption
Integrity
Ensure that it
can be identified
if a transaction
has changed
between the
sender and
the receiver.
§ Message
Authentication
Code (MAC)/
Hash
Privacy
Ensures that
§
information
provided by
§
employees,
§
customers and
other is protected
so that the
information is used
solely for the stated
purpose of the
enterprise’s customer
privacy policies, the
person has authorized
NonInterference
such use and its
use is in compliance
with all local privacy
regulations.
NonRepudiation
Ensure that both the
sender and receiver
of information can
unequivocally prove
that the exchange
occurred.
§ Digital
Signature
§ Time Stamp
Availability
Ensure that an
enterprise’s IT
infrastructure has
suitable
recoverability and
protection from
system failures,
natural disasters
or malicious
attacks.
§ Redundancy
§ Load
Balancing
§ Policies &
Procedures
§ Business
Continuity
Plan
§ Alternate
Processing
Site
Source: Gartner Research (Witty, et al., 2001)
Security principles from the industry leaders
The following are the components of Deloitte’s
guiding security principles for the design of information
security architectures, which are particularly relevant to
the case being investigated in this project:
Intrusion: Ensures that access to systems and inforn1ation
can only be gained through authorized access methods.
Authentication: Ensures that only authorized personnel
are able to access the systems and information.
Authorization: Ensures that access to systems and
information is restricted to those with an authorized
requirement for such access.
Encryption: Protecting information in transit and in storage
through the use of encryption.
Accountability: Ensures that access to systems and
information by users is appropriately recorded.
Availability: Ensures that systems and information are
available to authorized users whenever required.
Endurability: Ensures that security risks are maintained
at acceptable levels over time.
Policies &
Procedures
Encryption
Policy
Management
Tools
Security Policies
Imposing network and systems security is only a
part of the overall security strategy. The literature refers to
the policies as another important aspect of security.
As seen earlier (Lewis, 2000), a critical component
of managing risk is to assign and manage liability clearly.
Lewis points out those authentication systems allow
28
organizations to assign liability to an account, and the
person owns that account. Such dependencies can be
articulated in the security policies of the organization.
Lewis suggests that security policies can also explicitly
define what people can do and when they can do it, and
policy conditions under which they are operating,
assigning, sharing or disclaiming any liability associated
with their actions. Non-repudiation, or the use of logging
and auditing functions to prove that something actually
happened, can also be used as tool in the case of an
incident.
Usage of insurance instruments is also proposed as
part of the policy measures to indemnify businesses (Lewis,
2000). The author observes that the insurance industry is
coming up with a completely new set of instruments
targeted at this area.
In addition to this, to effectively deal with system
and security risks, Straub and Welke (1998) propose that
managers should initiate a theory-based security program
that includes (1) use of a security risk planning model, (2)
education in security awareness, and (3) countermeasures
matrix analysis.
Perhaps the most important aspect is defining and
imposing an acceptable security policy framework for the
organization as far as usage of information systems are
concerned. It has been observed that insider attacks, or
attacks from the employees, attribute to a major proportion
of network attacks (Ehinger, 2000). Ehinger observes that
effective implementation of network resources use policies
could prevent such events to an extent. Examples include
policies on using modems in the corporate networks,
telecommuting, and usage of Email and the Internet.
one of the important ethical issues of the information age.
Kreie and Cronan (2000) believe that in certain situations,
external influences such as company standards are likely
to affect employees’ behavior. The proposed solution to
this issue is to encourage ethical decision making by having
a written code of ethics and providing ethical training.
Countermeasures of risks
What can be done to reduce the effect of security
risks of an information system? It is widely accepted that
countermeasures or strategies adopted to reduce security
risks, fall into four categories of sequential actions (Straub
and Welke, 1998), namely: (1) deterrence, (2) prevention,
(3) detection, and (4) recovery. Straub and Welke notes that
a certain portion of the potential system risks can be
prevented by “deterrent” techniques, such as policies and
guidelines for proper system use and by reminders for users
to change their passwords, etc.
If users choose to ignore deterrents, the next line of
system defense is “preventives,” such as locks on computer
room doors and password access controls. The literature
refers to preventive measures as active countermeasures
with inherent capabilities to enforce policy and prevent
illegitimate use (Straub and Welke, 1988).
If abusers successfully penetrate through the first
two levels of defense systems, the organization needs the
ability to “detect” the misuse. Examples for this mechanism
include activity reports and system audit trails. The
primary purpose of this security response is to gather
evidence to identify the abuser.
Finally, an effective security program should be able
to help “recover” from the harmful effects of a harmful act
and to punish the offenders.
People and security risks
References:
The people aspect of systems security is an area not
to be overlooked. Long (2001) stressed the importance of
background checks of people before employing them and
assigning them to work on critical information systems.
Long pointed out that lowering applicant screening
standards may result in putting the wrong person on the
payroll and open the road to work-related crime and related
issues.
Some researchers believe in the importance of ethical
issues associated with accessing and using confidential
information (Smith et al., 1996; Kreie and Cronan, 2000).
Today’s information technology makes vast amount of
information accessible to businesses and their employees.
The authors point out that this creates the potential for
misuse of information technology, and businesses are to
be concerned about the ethical behaviour of their employees
and the security of their information systems. Smith, et al
(1996) point out that information privacy has been called
1.
2.
3.
4.
5.
29
Brancheau, J.C., Janz, B.D. and Wetherbe, J.C. 1996.
“Key issues in information Systems management:
1994-95 SIM Delphi results,” MIS Quarterly,
Minneapolis; Jun, Vol. 20, Iss. 2, pg. 225
CSI. 2001. Financial losses due to Internet intrusion,
trade secret theft and other cybercrimes soar, Sixthannual Computer Security Institutes/FBI computer crime
and security survey, (press release), URL:
Ehinger, D.P. 2000. Considerations for an acceptable
use policy for a commercial enterprise, SANS
Institute. URL:
Fink, D. 1995. “IS security issues for the 1990s:
Implications for management,” Journal of systems
Management, Cleveland: Mar/Apr; Vol. 46, Iss. 2, pg.
46
Fogarty, K. 2001. “Better Part of valor?”
6.
7.
8.
9.
10.
11.
Computerworld, 2001. Framingham; Jul 16; Vol. 35,
Iss. 29; pg. 38
Fonseca, B. and Lee, S. 2001. “Changing face of
security,” InfoWorld, Framingham; Apr 16; Vol. 23,
Iss. 16; pg. 8
Gaudin, S. 2001. “Cost of computer crime explodes,
survey says, Network World, Framingham. Mar 12;
Vol. 18, Iss. 11, pg 1 http://www. sans.org/
infosecFAQ/policy/considerations.htm [11 Sep
2001]
ISC. 2000. Internet domain survey: Number of
Internet hosts. Internet Software Consortium Survey
Results, URL: http://www.isc.org/ds/host-counthistory.html [29 Jan 2001]
Kreie, J. and Cronan, T.P. 2000. “Making ethical
decisions,” Communications of the ACM, New York;
Dec; Vol. 43, Iss. 12, pg 66-71
Lewis, J. 2000. “Security strategy must focus on
business issue of managing risk,” InternetWeek,
Manhasset; Oct 2; Iss. 831, pg. 41
Long, J.W. 2001. “Background checks step by step,”
12.
13.
14.
15.
16.
30
Security Management, Arlington; Feb; Vol. 45, Iss. 2,
pg. 72
Smith, S.J., Milberg, S.J. and Burke, S.J. 1996.
“Information privacy: Measuring individuals’
concern about organizational practices,” MIS
Quarterly, Minneapolis; Jun; Vol. 20, Iss. 2; pg. 167
Straub. D.W. and Welke, R.J. 1998. “Coping with
system risk: Security planning models for
management decision making,” MIS Quarterly,
Minneapolis; Dec; Vol. 22, Iss. 4; pg. 441-469
Veysey, S. 2001. “E-commerce risks about for
companies,” Business Insurance, Chicago; Apr 9; Vol.
35, Iss. 15, pg. 15
Watson, R.T., Kelly, G.G., Galliers, R.D. and
Brancheau, J.C. 1997. “Key issues in information
systems management: An international
perspective,” Journal of Management Information
Systems, Armonk; Spring; Vol. 13, Iss. 4, pg. 91-115
Witty, et. al. 2001. The price of information security.
Strategic Analysis Report: Gartner Research, June 8;
Note Number: R-11-6534
Ind Jour Math & Comp Sc. Jhs. Vol. II - Pt - I, 2013 Pg 31-36
An Analysis of a queue with length distribution
according to its priorities
RAM KHILAWAN TIWARI, DR. DHARMENDRA BADAL*
Department of Mathematics, G.B.S. College, Mauranipur
*Department of Mathematical Sciences and Computer Application, Bundelkhand University, Jhansi (U.P.)
*E-mail:
[email protected]
length distribution as a solution of linear equations.
Besides, numerical examples are given.
ABSTRACT : Abstract. We consider a single server multiclass queueing model with Poisson arrivals and relative
priorities. For this queue, we derive a system of equations
for the transform of the queue length distribution. Using
this system of equations we find the moments of the queue
length distribution as a solution of linear equations.
Transform of the queue length distribution
We consider an M/G/1 queue with relative
priorities and K classes of customers. Each class i customer
Introduction
has a positive priority parameter
We consider a multi-class queueing model with
relative priorities. In the relative priority service discipline
for a single server (processor) system with K classes of
customers, if at some service completion there are nj
customers of class j, j = 1, . . . ,K, then the next customer to
commence service is selected from class i customers with
probability.
n i pi
¦
K
j =1
p i , i = 1,...., K.
Customers of class i arrive in a Poisson stream with rate
λ i . The overall arrival rate is λ = ¦i =1 λ i . The service
K
times of class i customers, denoted by random variable Xi,
have an identical distribution function Bi(t) with LaplaceStietjes transform
B *i (s ) =
³
∞
e − st dB i (t ) .
0
traffic intensity for class i customer is
, i = 1,..., K.
n jpj
the total traffic intensity is
Once a customer has started service, it is served
without interruption until completion.
Relative priority model is related to the well-known
model of discriminatory processor sharing (DPS), see the
recent survey [2]. An essential difference with DPS is that
for DPS all customers in the system are served
simultaneously by a single processor, whereas in relative
priority model, the processor serves customers one at a
time until their service has been completed.
A single server multi-class queueing model with
relative priorities was first suggested in [4]. For the analysis
of queueing model with relative priorities it seems that
Haviv and van der Wal [5] is the only known result in
open literatures. Haviv and van der Wal [5] obtained the
mean waiting times for the M/G/1 queue with relative
priorities.
In this paper we consider a single server multi-class
queueing model with Poisson arrivals and relative
priorities. For this queue, we derive a system of equations
for the transform of the queue length distribution. Using
this system of equations we find the moments of the queue
Let
ρ=
¦
The
ρ i = λ i E[X i ] and
K
j =1
ρj.
N i (t ), i = 1...., K, be the number of class i customers
in the system at time t. Let
Then
τn
be the nth departure epoch.
{(N (τ + ),...., N (τ + )): n = 1,2,...}
1
n
K
n
is a
Markov chain, called an embedded Markov chain (EMC).
We observe that
P ((N 1 (τ n +1 + ), ..., N K (τ n +1 + )))
= (l1 ,....,lK ) | (N1 (τn +),...,NK (τn +))= (n1 ...,n K )
K λi
°¦i=1 λ bi (l1 ,...lK ) if (n1 ..., n K ) = (0,...,0),
°
= ®
n i pi
°¦K
bi ((l1 ,..., lK ) − (n1 ,..., n K ) + 1i )
i=1
n1 p1 + ... + n K pK
¯°
if (n1 ,....,lK ) = (0....,0),
2.1
31