Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

    Trending Tags

    • Events
      • All
      • Science Stories
      • Scientific Projects

      Tonight announces the Ig Nobel Prize winners

      frog

      Frog Wins Ig Nobel Prize 2005

      canhcutIg

      Life is Not Lacking in Quirks

      Nobel Prize in Medicine 2005: A Modern Fairy Tale

      10 Weird Inventions Awarded the Ig Nobel Prize 2005

      nobelKT

      Why Did They Win the Nobel Prize in Economics?

      giaydientu

      “Electronic Paper” Set to Appear on the Market

      Development of Science and Technology in the South Central Coast and Central Highlands Provinces

      a russian scientist loves vietnam 1659

      A Russian Scientist Who Loves Vietnam

    • Lifestyle
      • All
      • Environment
      • Medicine & Health
      tdnong

      Global warming may be the cause of major storms

      traxanh1

      Green tea has effects against dementia

      Discovery of Cancer-Preventing Genes in the Human Body

      Khachdulich Indonesia

      Avian influenza harms tourism more than terrorism

      nao

      Lying – A Disease of People with Brain Defects

      cafe

      Coffee May Prevent Cancer

      tebaocum

      Recreating the ‘Death’ Flu Virus of 1918

      Indo ban

      The whole world unites to fight avian influenza

      HIV aids

      The Mystery of AIDS Epidemic

      Trending Tags

      • Technology
        • All
        • AI - Artificial Intelligence
        • Computer Science
        • New Technology
        • Scientific Inventions
        top apps explore space solar system on pc 98000

        Top Applications for Exploring the Universe and Solar System on PC

        vai dien tu 650

        Soon there will be data-transmitting clothing

        sua loi khong vao dc coc coc 650

        Why can’t Cốc Cốc download videos to the computer?

        may tinh cu 1

        17 Things You Can Do with an Old Computer

        play free games super fun on android devices 54708

        Play Extremely Fun Free Games on Android Devices

        top 10 best weather apps on android 98127

        Top 10 Best Astronomy Apps on Android

        canh tay robot 650

        Robot system helps neutralize mines

        trang trai noi o rotterdam 650

        Modern Cities Combining Gardens and Cattle Farms

        city tree 650

        “High-tech” trees can purify polluted air

      • Cultural Heritage
        ai cap 650

        The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

        khao co 650

        Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

        baroque churches philippines 67188

        Baroque Churches – Philippines

        mont saint michel france 67265

        Mont Saint Michel Island – France

        acropolis bracelet in athens greece 67621

        Acropolis Fortress in Athens – Greece

        language mo tan thuy hoang china 67087

        Tomb of Qin Shi Huang – China

        historical city ayutthaya 67804

        Historical City of Ayutthaya

        historical city ayutthaya 67804 2

        Historic City of Ayutthaya

        mesa verde national park 67201

        Mesa Verde National Park – United States of America

        Trending Tags

        • Entertainment
          • All
          • Photo Library
          • Videos

          Honesty

          Telephone

          Advanced Technology

          Terminal Illness

          Allergy

          Love Like Mars

          Super Definition

          Coi Sách

          Selling Candy

        No Result
        View All Result
        Scimyst
        • Home
        • Discoveries
          • All
          • 1001 Mysteries
          • Aliens & UFOs
          • Animal World
          • Archaeology
          • Biology
          • Doomsday
          • Famous Landmarks
          • History
          • Mars Exploration
          • Military Science
          • Oceanography
          • Science Q&A
          • Scientific Discoveries
          • Space Science
          • Why
          • World Figures
          • World Wonders
          thanh pho trang 650

          The Lost City of 500 Years Containing Flesh-Eating Parasites

          creating the worlds first plasma lamp not using a wire just throw it away 133669

          Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

          which country suffers the most natural disasters in the world every year 136695

          Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

          strange spc exoplanet

          10 Most Strange Things of the Universe

          thuan tay trai 650

          Left-Handed People and 16 “Shocking” Facts

          cham do ben khoe mieng 650

          The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

          tinh van con cua 650

          Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

          cau hon o phap 650

          Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

          isaac Newton1

          10 Famous Inventions of Isaac Newton

          Trending Tags

          • Events
            • All
            • Science Stories
            • Scientific Projects

            Tonight announces the Ig Nobel Prize winners

            frog

            Frog Wins Ig Nobel Prize 2005

            canhcutIg

            Life is Not Lacking in Quirks

            Nobel Prize in Medicine 2005: A Modern Fairy Tale

            10 Weird Inventions Awarded the Ig Nobel Prize 2005

            nobelKT

            Why Did They Win the Nobel Prize in Economics?

            giaydientu

            “Electronic Paper” Set to Appear on the Market

            Development of Science and Technology in the South Central Coast and Central Highlands Provinces

            a russian scientist loves vietnam 1659

            A Russian Scientist Who Loves Vietnam

          • Lifestyle
            • All
            • Environment
            • Medicine & Health
            tdnong

            Global warming may be the cause of major storms

            traxanh1

            Green tea has effects against dementia

            Discovery of Cancer-Preventing Genes in the Human Body

            Khachdulich Indonesia

            Avian influenza harms tourism more than terrorism

            nao

            Lying – A Disease of People with Brain Defects

            cafe

            Coffee May Prevent Cancer

            tebaocum

            Recreating the ‘Death’ Flu Virus of 1918

            Indo ban

            The whole world unites to fight avian influenza

            HIV aids

            The Mystery of AIDS Epidemic

            Trending Tags

            • Technology
              • All
              • AI - Artificial Intelligence
              • Computer Science
              • New Technology
              • Scientific Inventions
              top apps explore space solar system on pc 98000

              Top Applications for Exploring the Universe and Solar System on PC

              vai dien tu 650

              Soon there will be data-transmitting clothing

              sua loi khong vao dc coc coc 650

              Why can’t Cốc Cốc download videos to the computer?

              may tinh cu 1

              17 Things You Can Do with an Old Computer

              play free games super fun on android devices 54708

              Play Extremely Fun Free Games on Android Devices

              top 10 best weather apps on android 98127

              Top 10 Best Astronomy Apps on Android

              canh tay robot 650

              Robot system helps neutralize mines

              trang trai noi o rotterdam 650

              Modern Cities Combining Gardens and Cattle Farms

              city tree 650

              “High-tech” trees can purify polluted air

            • Cultural Heritage
              ai cap 650

              The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

              khao co 650

              Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

              baroque churches philippines 67188

              Baroque Churches – Philippines

              mont saint michel france 67265

              Mont Saint Michel Island – France

              acropolis bracelet in athens greece 67621

              Acropolis Fortress in Athens – Greece

              language mo tan thuy hoang china 67087

              Tomb of Qin Shi Huang – China

              historical city ayutthaya 67804

              Historical City of Ayutthaya

              historical city ayutthaya 67804 2

              Historic City of Ayutthaya

              mesa verde national park 67201

              Mesa Verde National Park – United States of America

              Trending Tags

              • Entertainment
                • All
                • Photo Library
                • Videos

                Honesty

                Telephone

                Advanced Technology

                Terminal Illness

                Allergy

                Love Like Mars

                Super Definition

                Coi Sách

                Selling Candy

              No Result
              View All Result
              Scimyst
              No Result
              View All Result
              Home Technology Computer Science

              Information Security – Where Should We Start?

              by Sci
              February 16, 2006
              in Computer Science
              0
              Share on FacebookShare on Twitter

              baomatWhen it comes to information security (IS), the first thing that often comes to mind is building a firewall or something similar to prevent attacks and unauthorized intrusions. This approach is not entirely correct because the nature of IS is not simply using some tools or a few solutions; it requires a more comprehensive and scientific perspective to ensure IS for a system.

              So, what is information security?

              It is impossible to guarantee 100% security, but we can reduce unwanted risks arising from various aspects of socio-economic activities. When organizations conduct risk assessments and carefully consider IS countermeasures, they always conclude that single technological solutions cannot provide sufficient safety. Products like anti-virus software, firewalls, and other tools cannot provide the necessary security for most organizations. IS is a link connecting two elements: the technological element and the human element.

              1. Technological element: This includes products such as firewalls, anti-virus software, cryptographic solutions, networking products, operating systems, and applications like web browsers and email software from workstations.

              2. Human element: This refers to computer users, those who work with information and utilize computers in their jobs.

              These two elements are interconnected through IS policies.

              According to ISO 17799, Information Security is the ability to protect the socio-economic information environment, ensuring the formation, use, and development for the benefit of all citizens, all organizations, and the nation. Through IS policies, leadership demonstrates their commitment and capability in managing information systems. IS is built on a foundation of an integrated system of policies, rules, procedures, and technical solutions aimed at ensuring the safety of the information resources owned by that organization, as well as the information resources of partners and customers in a global information environment. Thus, given its importance, it can be affirmed that the issue of IS must begin with policies, where humans are the most critical link.

              Humans are the weakest link in the entire process of ensuring information security. Almost all methods of attack used by hackers exploit vulnerabilities in the information system, and most of these vulnerabilities are unfortunately created by humans. Poor awareness and non-compliance with IS policies are the main causes of this issue. For instance, the use of passwords is clearly specified in IS policies, yet compliance with these regulations is not strictly enforced. Setting weak passwords, failing to change passwords regularly, and lax password management are the weakest points that hackers can exploit to infiltrate and attack.

              Methods for assessing the quality of an IS system

              Perhaps no leader would dare to assert that their company is truly safe and reliable internally. In the current market economy context, competition is intense, even among employees within the company: competing for customers, advancing their careers, or other unhealthy purposes. In some organizations, taking advantage of lax IS management, employees have engaged in dishonest behaviors such as stealing confidential information, misappropriating customer accounts, and embezzling money through credit systems. Statistics show that about 70% of IS risks originate from within the organization. One of the questions frequently posed to leaders and information managers is: “How safe is the organization’s information system?” This question is of utmost concern and is also the most sensitive issue in managing information systems.

              Answering this question is not simple, but it is not without an answer. To address this issue, two primary IS assessment methods are used:

              + Assessment method based on the quality of IS by scoring. For example, the system achieves a score of 60/100 or 60%.
              + Assessment method based on the quantity of security devices and technologies.

              In practice, the quality assessment method is the only way to evaluate the safety level of resources in the information system. In Vietnam, quality assessment of IS is entirely new. There is a common misconception that equipping an IS tool (like a firewall or anti-virus) guarantees IS for the system. The quality of IS must be evaluated across all elements ensuring system safety, from organization, human resources, physical security, resource management, to the use of technical tools. In other words, IS quality is assessed based on the implementation of IS policies within the system. These policies are standardized and recognized as IS standards applicable globally.

              The quantity-based assessment method should not be used.

              Quality assessment standards for IS.

              Assessing the IS level of organizations is often conducted based on experience and subjective, local regulations of that organization, without considering globally recognized standards. A few years ago, the British Standards Institute (BSI), along with several trade organizations like Shell, National Westminster Bank, Midland Bank, etc., researched and proposed an IS standard. By 1995, this standard was recognized as the national standard for IS management – BS7799. This standard is independent of the operational models of companies. Company leaders, CSOs/CIOs, etc., have based their IS policies for their units on these standards. Immediately after its establishment, BS7799 was used in 27 countries, including those in the Commonwealth and other countries like Switzerland and the Netherlands. By 2000, the International Organization for Standardization (ISO), based on BS7799, developed the ISO 17799 standard, which became the international standard for IS quality management (ISO/IEC 17799). As of February 2005, more than 1,000 organizations had received ISO 17799 certification, including Hitachi, Nokia, Fujitsu, Siemens, and many other well-known companies.

              The basic components of ISO 17799:

              1. General policy
              2. Personnel security
              3. Identification, classification, and management of resources
              4. Physical security
              5. Security organization
              6. IT operations and network management
              7. Access control and methods
              8. System development and maintenance
              9. Business continuity and disaster recovery planning
              10. Compliance with legal, ethical factors

              antoanthongtinIS policies are organized in a pyramid model. This structure helps leaders manage the quality of information security scientifically and effectively.

              The top of the pyramid describes the policies applied within the organization. Why do we need to establish these policies? What is the scope and target audience of the policy? There is no universal policy applicable to all units. Within one organization, there are many departments, each with different functions and responsibilities, and the nature and organization of information also vary. The business department has its own system design model with a database tailored to its business needs, while the production and research departments also have their own system structures and databases. The level of awareness regarding information security varies significantly. Therefore, when establishing policies, managers need to clearly define the purpose of the policy, target audience, scope of impact, etc.

              The second layer of the model describes the rules and regulations for implementing the policies. What do we need to do to implement the policies? The system of IS rules is reflected across ten major areas encompassing regulations from organization, personnel, physical security to technical safety tools. The rules are built on the standard IT model of the organization and reflect the specific characteristics of that organization. Through the implementation of these rules, the quality of an organization’s IS can be assessed through audits.

              The third layer is the final layer of the model. This includes procedures and solutions that support the implementation of the aforementioned rules and regulations. It answers the question of how to implement these regulations. Information security managers (CSOs) and IT administrators establish these procedures and disseminate them to all employees in the organization, for example, “Password change procedure,” “Procedure for installing anti-virus programs and combating malware,” etc. These procedures may relate to various policies and different user groups.

              What benefits does the application of ISO 17799 bring to organizations?

              Applying IS standards according to ISO 17799 increases awareness among staff about IS. It builds a safe environment that is resilient against risks, minimizing dangers posed by human factors. The ISO 17799 standard sets out general principles for the scientific design and construction of information systems, making system management clearer, safer, and more transparent. We build a “Secure People Wall” within the organization. A safe and clean information environment will significantly impact the reduction of material costs for IS, which are inherently high. In the long term, obtaining ISO 17799 certification is a compelling affirmation to partners and customers about a safe and clean information environment. It facilitates the integration into a healthy information environment, which will strongly influence the organization’s competitive advantage.

              The issue of human resource training

              According to IDG, around 2006, a new profession in the IT field will emerge – information security. The title CSO (Chief Security Officer) is becoming familiar in the IT field.

              Updating and enhancing knowledge about IS and understanding its role in IT systems is very important and urgent because, ultimately, human actions are the decisive factor. Although IS is widely recognized, human factors are often overlooked by organizations. For managers, they need a safety policy and a program for awareness as well as quality assessment of IS, but unfortunately, there are currently not many solutions that genuinely focus on how to strengthen this inherently weak link in IS.

              Currently, some enterprises in Vietnam have made positive changes in their awareness of IS. They are willing to invest a budget for human resource training to create a solid foundation of awareness and knowledge about IS for their workforce. Notable examples include the Department of Science and Technology of Dong Nai, Bao Minh Insurance Company, Fujitsu Vietnam, Asia Commercial Bank, etc.

              However, many enterprises, especially small and medium-sized ones, still have not fully understood the importance of establishing IS policies and managing IS quality standards according to ISO 17799, which remain unfamiliar and novel to them.

              Information security in general, and the assessment of information security quality in particular, is still a new issue in Vietnam. It is hoped that this article will provide managers and policymakers with additional information on quality management of IS as well as approaches to information security – a very sensitive issue today. The article also clearly outlines the role of humans – the weakest link in ensuring information security and the importance of human resource training in this field.

              Dr. Dao The Long – Misoft ISTC
              Email:
              [email protected]

              I’m sorry, but it seems that there is no Vietnamese article provided in your request. Please provide the text you would like me to translate, and I’ll be happy to assist you!

              Next Post
              recover damaged rar file 3453

              Recovering a Corrupted RAR File

              sun reveals new security features 3454

              Sun Reveals New Security Features

              software company these days a lot of money has no expiration date 3455

              Modern Software Companies: Having Money Doesn't Always Mean Success

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              FEATURED POST

              the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

              The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

              space monsters in mythology first appearance 129358

              Cosmic Monster ‘in Legend’ Appears for the First Time

              the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

              The world’s most dangerous strait – The haunting toll measured in sailors’ lives

              10 amazing natural phenomena that challenge science 60818

              23 Mysterious Natural Phenomena That Challenge Science

              TRENDING

              military aircraft can fly high how much 133706
              Scientific Discoveries

              How High Can Military Aircraft Fly?

              no cave no peak excluding china leaves the world amazed when building a bridge like a dragon flying over the river 136956
              Scientific Discoveries

              No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

              the truth about the 300 year old swan raising in siberia 137566
              Archaeology

              The truth about the 2,300-year-old stuffed swan in Siberia

              the 135630 world dynamic cyanide poisoning episodes
              Scientific Discoveries

              The Cyanide Poisoning Cases That Shocked the World

              EDITOR PICK'S

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              The truth about the 2,300-year-old stuffed swan in Siberia

              Why is Israel considered the smallest superpower in the world?

              Why is sea ice pure like freshwater while the ocean is salty?

              Records of the “Real” Dragons in History

              NASA reveals the reason why the entire Starlink satellite “fleet” was dropped

              17 Causes of Throat Tightness and Belching

              Newsletter

              THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

              Subscribe to our mailing list to receives daily updates direct to your inbox!

              Category

              • 1001 Mysteries
              • AI – Artificial Intelligence
              • Aliens & UFOs
              • Animal World
              • Antibiotic Resistance
              • Archaeology
              • Bacteria & Insects
              • Biology
              • Biotechnology
              • Climate & Weather

              Site Link

              • Log in
              • Entries feed
              • Comments feed
              • WordPress.org

              About Us

              At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 Scimyst - Your gateway to the wonders of science and culture

              No Result
              View All Result
              • Home
              • Discoveries
                • 1001 Mysteries
                • Aliens & UFOs
                • Animal World
                • Archaeology
                • Biology
                  • Bacteria & Insects
                  • Biotechnology
                  • Plants
                • Doomsday
                • Famous Landmarks
                • History
                  • This Day in History
                • Military Science
                • Mars Exploration
                • Oceanography
                • Science Q&A
                • Science Quiz
                • Scientific Discoveries
                • Space Science
                • Why
                • World Figures
                • World Wonders
                  • Cultural Heritage
                  • Vietnamese Heritage
              • Technology
                • AI – Artificial Intelligence
                • Computer Science
                • New Technology
                  • Self-Driving Cars
                • Scientific Inventions
              • Lifestyle
                • Cancer
                • Environment
                  • Climate & Weather
                  • Disasters
                  • Latest Storm Updates
                  • Nature
                  • Solutions
                • Medicine & Health
                  • Antibiotic Resistance
                  • Common Illnesses
                  • Dengue Fever
                  • Family Medicine Cabinet
                  • Food Safety
                  • Health
                  • Influenza Outbreak
                • Scientific Applications
              • Events
                • Science Events
                • Science Stories
                • Scientific Projects
              • Entertainment
                • Photo Library
                • Videos

              © 2025 Scimyst - Your gateway to the wonders of science and culture