The notion of  information and basic types of information ELSA Conference Strumica,  27.11.2008 LjubomirTrajkovski [email_...
About you and about us
Why does any discussion of the law have to be so complicated? Okay, um, the law is like an onion . Oh, it’s stinky? Yes! N...
Trajkovski & Partners Consulting – T&P <ul><li>“ Small but beautiful” management consultancy practice. </li></ul><ul><li>F...
“…  IN THE BEGINNING  IT WAS ONLY INFORMATION… LATER COME SECURITY…”
Information Age  <ul><li>Every Age has its own “primadona” </li></ul><ul><ul><li>E.g. Stone Age, Iron Age </li></ul></ul><...
Information as “primadona” <ul><li>A few check questions ? </li></ul><ul><li>How much money do you have ? </li></ul><ul><l...
An very old Hebrew curse <ul><li>Let’s God give you something you like and  </li></ul><ul><li>than take it back! </li></ul...
Simple scenario <ul><li>1. You received your scholarship on your banck account. ( you have a Credit Card) </li></ul><ul><l...
INFORMATION SYSTEM AND INFORMATION SECURITY
Information System components <ul><li>Information ( actually data) </li></ul><ul><li>Equipment (hardware) for </li></ul><u...
Maslow theory of basic human needs <ul><li>1 st  level  - To be or not to be !( water, air, food, sex…., survival, SAFETY)...
Safety v.v. Security v.v. Business Continuity  <ul><li>SAFETY  : a fast moving car can hurt you on cross-road ( “Hazard”) ...
Information Security CRITERIAS <ul><li>C   – onfidentiality (  only  authorized users to have right to use  information sy...
Information Security CRITERIAS-Example <ul><li>C   – onfidentiality </li></ul><ul><ul><ul><li>Your bank account to be used...
INTERNET AND SECURITY
Internet a Global Village  <ul><li>Village ? </li></ul><ul><ul><li>What means village, what characterizes village , who is...
Identity and Trust                                                                                             
Security ( in any sense)
Other important security issues <ul><li>SPAM ( “chain letters”, e-marketing, Denial of Service) </li></ul><ul><li>Social N...
WHO IS RESPONSIBLE FOR INFORMATION SECURITY ?
World wide InfoSec “enemies” and “defenders”  <ul><li>“ Enemies” </li></ul><ul><li>No.1: yours optimism </li></ul><ul><li>...
Why  YOU are “enemy No.1” ?
Hemingway find the idea where from ?  <ul><li>Novel title page  :  </li></ul><ul><li>&quot;For Whom the Bells Tolls ?“ </l...
I wish Secure life  TO ALL OF US  in the Internet Global Village Thank you for being with you.
Upcoming SlideShare
Loading in …5
×

1 The Notion Information And Basic Types Of Information

1,481 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

1 The Notion Information And Basic Types Of Information

  1. 1. The notion of information and basic types of information ELSA Conference Strumica, 27.11.2008 LjubomirTrajkovski [email_address]
  2. 2. About you and about us
  3. 3. Why does any discussion of the law have to be so complicated? Okay, um, the law is like an onion . Oh, it’s stinky? Yes! No! It makes you cry? No! The law has layers! Onions have layers and the law has layers! Oh, layers . They both have layers . You know, not everybody likes onions.
  4. 4. Trajkovski & Partners Consulting – T&P <ul><li>“ Small but beautiful” management consultancy practice. </li></ul><ul><li>Founded in early 1991 in Skopje </li></ul><ul><li>Specialized in Implementation of ISO Management Standards </li></ul><ul><li>Sub-specialization : </li></ul><ul><li>Implementation of Information Security Management Systems based on ISO 27001 family of standards </li></ul><ul><li>T&P is the first consultancy practice in the Region </li></ul><ul><li>certified for ISO 27001 by British Standards Institute </li></ul>
  5. 5. “… IN THE BEGINNING IT WAS ONLY INFORMATION… LATER COME SECURITY…”
  6. 6. Information Age <ul><li>Every Age has its own “primadona” </li></ul><ul><ul><li>E.g. Stone Age, Iron Age </li></ul></ul><ul><li>There are “transitions” between Ages </li></ul><ul><ul><li>E.g. Industrial Revolution, INFORMATION Revolution </li></ul></ul><ul><li>Do you like ( or even love ) “transitions”? </li></ul>
  7. 7. Information as “primadona” <ul><li>A few check questions ? </li></ul><ul><li>How much money do you have ? </li></ul><ul><li>How qualified/competent are you? </li></ul><ul><li>How healthy are you? </li></ul><ul><li>How much are you known in your social circle? </li></ul><ul><li>Please for your answers!!! </li></ul>
  8. 8. An very old Hebrew curse <ul><li>Let’s God give you something you like and </li></ul><ul><li>than take it back! </li></ul><ul><li>Да даде Господ да имаш па да немаш ! </li></ul>
  9. 9. Simple scenario <ul><li>1. You received your scholarship on your banck account. ( you have a Credit Card) </li></ul><ul><li>2. Someone get your card number and its PIN </li></ul><ul><li>3. You are “rich” ( but for how long?) </li></ul>
  10. 10. INFORMATION SYSTEM AND INFORMATION SECURITY
  11. 11. Information System components <ul><li>Information ( actually data) </li></ul><ul><li>Equipment (hardware) for </li></ul><ul><ul><li>collecting, storing, processing and distributing information </li></ul></ul><ul><li>Communication (lines, Internet) for </li></ul><ul><ul><li>“ moving” , sharing , presenting information </li></ul></ul><ul><li>People </li></ul><ul><ul><li>Operating and managing with information system, </li></ul></ul><ul><ul><li>using information, </li></ul></ul><ul><ul><li>MIS-using information (hackers, cybercriminals) </li></ul></ul><ul><li>Procedures </li></ul><ul><ul><li>(applications, working instructions, standards , laws ) </li></ul></ul>
  12. 12. Maslow theory of basic human needs <ul><li>1 st level - To be or not to be !( water, air, food, sex…., survival, SAFETY) </li></ul><ul><li>2 nd level – To have it always ! ( SECURITY) </li></ul><ul><li>3 rd level – To be accepted as Member/partner in a community, team, company </li></ul><ul><li>4 th level – to be accepted as a leader </li></ul><ul><li>5 th level – I have everything ( to be a God!) </li></ul>
  13. 13. Safety v.v. Security v.v. Business Continuity <ul><li>SAFETY : a fast moving car can hurt you on cross-road ( “Hazard”) </li></ul><ul><ul><li>It is NOT SAFE to be on the cross-road when a fast moving car is passing by! </li></ul></ul><ul><li>SECURITY – Traffic light make it safety to pass the cross-road when light is GREEN for you and RED for all cars ( “mitigation” – a way to reduce hazard ) </li></ul><ul><ul><li>It is SECURE to cross road if there is a GREEN traffic light ON ! </li></ul></ul><ul><li>CONTINUITY – Traffic light is not working – what alternative we have ? </li></ul><ul><ul><li>Policemen is taking control on UNTIL the traffic light become operational again </li></ul></ul>
  14. 14. Information Security CRITERIAS <ul><li>C – onfidentiality ( only authorized users to have right to use information system-HW, SW, Comm, Info/Data, Procedures </li></ul><ul><li>I -ntegrity ( data, HW, SW, Comm, Info/data, Procedures to be CORRECT and in GOOD SHAPE) </li></ul><ul><li>A -ccessability ( to be available and accessible when it is needed) </li></ul>
  15. 15. Information Security CRITERIAS-Example <ul><li>C – onfidentiality </li></ul><ul><ul><ul><li>Your bank account to be used and available ONLY by you </li></ul></ul></ul><ul><li>I -ntegrity </li></ul><ul><ul><ul><li>If you have 10.000 MKD on your bank account that amount to be visible when you are using your bank’s BANKOMAT </li></ul></ul></ul><ul><li>A -ccessability </li></ul><ul><ul><ul><li>Bankomat to be working always 24/7/365 ( temporary not working) </li></ul></ul></ul>
  16. 16. INTERNET AND SECURITY
  17. 17. Internet a Global Village <ul><li>Village ? </li></ul><ul><ul><li>What means village, what characterizes village , who is leaving in village, how I know it? </li></ul></ul><ul><ul><li>Not written “rules” for leaving in a village </li></ul></ul><ul><li>Global ? </li></ul><ul><ul><li>Size, inter relations between participants, who knows whom, trust,… </li></ul></ul><ul><li>Is Global Village possible ? </li></ul><ul><ul><li>If YOU (Lawyers) help ! </li></ul></ul><ul><ul><li>Written rules are MUST ! </li></ul></ul><ul><li>Can a Global Village exists without Internet? </li></ul>
  18. 18. Identity and Trust                                                                                            
  19. 19. Security ( in any sense)
  20. 20. Other important security issues <ul><li>SPAM ( “chain letters”, e-marketing, Denial of Service) </li></ul><ul><li>Social Networks ( YOUTUBE, chats,…) </li></ul><ul><li>Virtual Places ( e.g. TV CSI New York ) </li></ul><ul><li>You are the main actors- your comments please ? </li></ul>
  21. 21. WHO IS RESPONSIBLE FOR INFORMATION SECURITY ?
  22. 22. World wide InfoSec “enemies” and “defenders” <ul><li>“ Enemies” </li></ul><ul><li>No.1: yours optimism </li></ul><ul><li>No. 2 : your ignorance </li></ul><ul><li>No. 3 : your lack of awareness </li></ul><ul><li>Information security </li></ul><ul><li>“ Defenders” </li></ul><ul><li>No.1: yours commitment </li></ul><ul><li>No. 2 : your knowledge </li></ul><ul><li>No. 3 : your awareness </li></ul><ul><li>= Your responsibility </li></ul>
  23. 23. Why YOU are “enemy No.1” ?
  24. 24. Hemingway find the idea where from ? <ul><li>Novel title page : </li></ul><ul><li>&quot;For Whom the Bells Tolls ?“ </li></ul><ul><li>Moto from second page : </li></ul><ul><li>&quot;Therefore never send to know for whom the bells tolls; it tolls for you“ </li></ul><ul><li>Source : </li></ul><ul><ul><li>( Meditation #17 By John Donne From Devotions upon Emergent Occasions (1623), XVII </li></ul></ul><ul><ul><li>Perchance(1), he for whom this bell tolls may be so ill, as that he knows not it tolls for him; and </li></ul></ul><ul><ul><li>Perchance (2) he may thinks himself so much better than he is, as that they who are about he, and see his state, may have caused it to toll for him, and he knows not that. </li></ul></ul>
  25. 25. I wish Secure life TO ALL OF US in the Internet Global Village Thank you for being with you.

×