NAME; AHMAD AIMAN, MUHAMMAD HAFIZI MUHAMMAD IQBAL INFORMATION SECURITY MANAGEMENT MODELS
In today's digital era, libraries serve as essential stewards of knowledge, offering extensive resources that enhance education, research, and community connections. With the integration of digital platforms, these institutions now provide convenient access to e-books, journals, databases, and other online materials. However, this technological evolution also brings challenges and responsibilities, particularly in safeguarding sensitive data and systems. Library information security encompasses strategies and practices designed to protect data, systems, and resources from threats like unauthorized access, cyberattacks, and data breaches. It aims to maintain the confidentiality, integrity, and availability of information. Confidentiality focuses on shielding user data and proprietary resources from unauthorized disclosure. Integrity ensures that data remains accurate and unaltered, while availability ensures uninterrupted access to resources and systems for users. Introduction
Protecting Sensitive Information Confidentiality Protecting user data and proprietary resources from unauthorized exposure. Integrity Ensuring data remains accurate and unaltered. Availability Ensuring users can access resources and systems without disruption.
1 Hurricanes High winds, heavy rainfall, and storm surges can devastate coastal areas. 2 Earthquakes Sudden release of energy in the Earth's crust, causing ground shaking and potential damage. 3 Floods Excessive water inundating land, causing damage to infrastructure and property. Force of Nature: Natural Disasters
NIST Security Publications Comprehensive, free, and adaptable guidelines for managing security. Covers topics like risk management, cryptography, and compliance (FISMA, GDPR). Models Selected Access Control Models Security Management Models Emphasize proactive measures like penetration testing and secure software development, integrating risk management to address threats and fostering a security-focused culture. Non-Discretionary Controls use centralized mechanisms like RBAC to restrict access based on roles, ensuring data security, supporting disaster recovery, and minimizing unauthorized access. Frameworks like RBAC and task-based controls for structured access management. Core principles: least privilege, need-to-know, and separation of duties.
Software Attacks: Exploiting System Vulnerabilities Malware Harmful programs like viruses, worms, ransomware, and spyware. Phishing Attackers pretending to be trusted entities to trick users into sharing sensitive information. Advanced Attacks Targeting specific flaws in software to take control of systems or steal data.
Cyber Threats and Vulnerabilities 1 Phishing Attacks Tricking users into sharing sensitive information through fake emails or websites. 2 Ransomware Locking user files and demanding payment for their release. 3 Distributed Denial of Service (DDoS) Attacks Overwhelming a system with traffic, making it unavailable to legitimate users.
Data Protection Laws Libraries must comply with laws like GDPR, ensuring responsible data collection, storage, and use. Intellectual Freedom Protecting the confidentiality of users' inquiries and research. Model Not Selected
Building a Resilient Information Security Strategy 1 Proactive Risk Management 2 Secure Software Development 3 Regular Updates and Patches 4 User Education and Awareness 5 Incident Response and Recovery
Knowledge sharing and safeguarding resources make libraries important dual social institutions in this fast-changing digital environment; they experience natural disasters, cyberattacks, and robust access control issues to mention just a few. Security models focus mostly on digital threats but are also helpful in recovering systems after disasters. But it takes a library to have an up-to-date and strong access control and educate the users on safe computer habits to watch for software attacks such as malware, phishing, or even one that exploits a vulnerability in the system. Frameworks such as NIST Security Publications and access control models hold various tools for solving related problems. With flexible systematic security strategies within legal and ethical boundaries, libraries can be able to protect their digital assets while ensuring their users have access to them. Conclusion