10.9 It is also important that information security implementation in an IT
application takes care of:
• Confidentiality of data meaning thereby that data or information is accessible
only to those authorised to have access;
• Integrity, so as to safeguard the accuracy and completeness of information and
processing methods; and
• Availability of data to authorised users and on time.
10.10 The objective of data security is “the protection of the interests of those relying
on information, and the information systems and communications that deliver the
information, from harm resulting from failures of availability, confidentiality, and
integrity.”
10.11 The concept of security applies to all information. Security relates to the
protection of valuable assets against loss, disclosure, or damage. In this context,
valuable assets are the data or information recorded, processed, stored, shared,
transmitted, or retrieved from an electronic medium. The data or information must be
protected against harm from threats that will lead to its loss, inaccessibility, alteration
or wrongful disclosure. The protection is through a layered series of technological and
non-technological safeguards such as physical security measures, background checks,
user identifiers, passwords, smart cards, biometrics, firewalls, etc.
10.12 Many of the general and application controls are aligned with the above
objectives of securing data as organisations may incur huge losses due to data loss. IT
security involves implementing a suitable set of controls, including a secure
environment, appropriate policies, procedures and practices, organizational structures
etc. to address the specific security objectives of the organization. In addition to the
risks associated with manual systems, IT systems are inherently open to certain
additional risks. Some of the threats faced by IT systems are as follows: