You are on page 1of 6

Feature

Information Security From a


Business Perspective
A Lottery Sector Case Study
Christos K. Dimitriadis, As enterprises struggle to remain profitable in needs. This lack of consistency has contributed to
Ph.D., CISA, CISM, an ever-changing risk environment, the current a lack of understanding and a lack of appreciation
is head of information economic crisis has elevated the need for for the value of information security.
security at INTRALOT S.A., effective business risk management. Information This article presents the definition of
a multinational supplier security, as explained in this article, acts as a information security in the lottery sector and,
of integrated gaming and key parameter that affects business risk. This is specifically, in a case study of GIDANI, the
transaction processing explored in this article in the context of the National Lottery of South Africa.
systems based in Greece. lottery sector.
In this role, he manages The academic definition of information Information Security Defined
information security in more security is the preservation of confidentiality, To define information security in the lottery
than 50 countries in all integrity and availability of information.1 sector, one must understand its business
continents. Dimitriadis is a Confidentiality is the preservation of secrecy of objectives, identify stakeholders and link them to
vice president on ISACAs information (e.g., business reports, technical information protection attributes.
Board of Directors. He has designs or financial projections) by ensuring that Lotteries sell games to the public. These games
served ISACA as chair of the viewing is conducted solely by authorized people. have to be trusted to achieve customer (player)
External Relations Committee Integrity is ensuring that information is accurate acquisition and retention, which directly affect
and as a member of the and consistent and has not been manipulated. the lotterys revenue. Player trust is a key success
Relations Board, Academic Availability ensures that information is accessible factor that is directly related to:
Relations Committee, to authorized people when needed. Game integrityEach game is conducted as
Journal Editorial Committee Historically, information security has described in its official rules. It is fair to the
and Business Model for been addressed primarily as a technical issue. players, the draw results are integral, and
Information Security (BMIS) Preventive controlssuch as firewalls, user winners are selected and paid according to the
Workgroup. He has worked access control mechanisms, encryption of data game rules. Information integrity (avoiding
in the area of information and communications, digital signatures, data data manipulation) is a key information security
security for 10 years and has backup systems, and detective controls such as component related to player trust.
65 publications in the field. intrusion detection systems or security monitoring Player asset protectionPlayers need to be
platformshave formed the basic components of confident that their money, credit card numbers
security architecture. Often, the technical controls and bank account numbers are safe. Especially
were complemented by a set of security policies, in online gaming, in which player participation
procedures and guidelines aimed at controlling is conducted with electronic funds, players have
the actions of personnel. to trust the lottery for securing their financial
 o you have
D This approach, though, has proven to be assets. Confidentiality, integrity and availability
something insufficient. Security incidents continue to rise are crucial security parameters.
to say about and security problems seem unsolved while Player privacyPlayers, and especially winners,
this article? information security experts have been challenged provide their personally identifiable information
Visit the Journal pages to effectively communicate the value of (PII) to lotteries. As in player asset protection,
of the ISACA web site information security to enterprise management. trust in the lottery is important for making
(www.isaca.org/journal), The root cause of these problems may be the the player feel comfortable with sharing such
find the article, and definition of information security itself. There is information. Trust is particularly important
choose the Comments a lack of consistency as each sector, industry and when dealing with large winning amounts
tab to share your even enterprise has had to define information because players have to feel safe and their
thoughts. security uniquely, based on very specific business personal data have to be protected.
ISACA JOURNAL VOLUME 1, 2011 1
Providing lottery games to the public also has societal and . Legal and regulatory compliance (e.g., the integrity of
political facets. Lotteries are usually controlled directly by financial records and PII protection)
the local government and are always subject to a regulatory Players trust, driven by:
and legal framework. The provision of secure and fair . Game integrity
lottery games to citizens is a matter of social responsibility. . Service availability
Moreover, the government is a shareholder of the lottery . Protection of the confidentiality of customers
(directly or indirectly though taxing); thus, a lotterys business sensitive information
success affects the corresponding governmental revenue. Using this definition of information security for the lottery
The aforementioned facts are clarified in relation to sector, a holistic approach is required for addressing the
information security when the drivers of shareholders trust information security requirements of each unique lottery.
are studied in more detail. For example: This, in turn, requires a detailed lottery business analysis for
Each licensed lottery has to comply with rules and terms embedding information security into the specific business
of the license, which in turn have general or more detailed processes of the lottery and for addressing the human factor
information protection requirements. These vary from and minimizing the uncertainty it introduces. International
general statements for game fairness, antifraud rules and security standards provide the basis toward that direction.
service availability requirements to more detailed technical
controls such as network security rules, operating security Lotteries and the Information Security
policies or certification requirements. Shareholders need Standards Landscape
to be confident that the lottery complies with the license In 2006, the Security and Risk Management Committee of
obligations and, more generally, the legal and regulatory the World Lottery Association (WLA)2 published the most
framework, since this is a main corporate viability factor. recent version of its Security Control Standard (SCS). This
In competitive environments where more than one lottery standard describes a number of information security controls
operates in the same region or illegal gambling is present, (technical and procedural) tailored to the lottery sector.
information security acts as a competitive advantage that, Indicatively, it includes rules regarding the management of
in turn, ensures customer acquisition. Shareholders trust lottery draws and protection of prize money and Internet
the lottery if it operates as a competitive corporation, and gaming systems. WLA SCS is an extension of the globally
due to the importance of protecting the game and lottery recognized information security standard ISO 27001 of
information from breaches, information security becomes a the International Organization for Standardization (ISO),3
competitive parameter. which is related to the establishment of information security
Shareholders are risk-averse entities in relation to the management systems (ISMSs). Such systems provide the
lotterys brand name. They need to be assured that the framework for managing information security from planning
lottery brand name is resilient to information security to implementation, monitoring and improvement.
threats that may cause reputation loss. ISACA has published a set of information technology
In relation to the business role of information security in (IT) auditing standards and the Risk IT: Based on COBIT
the lottery sector, the following definition can be deduced: framework,4 which provides a set of guiding principles for
Information security is defined as a driver of: effective management of IT risk. Risk IT complements COBIT,5
Stakeholders trust, driven by: a comprehensive framework developed by ISACA for the
Shareholders trust, driven by: governance and control of business-driven, IT-based solutions
. Corporate viability, which is driven by compliance of and services. In 2009, ISACA published An Introduction to the
lottery license terms Business Model for Information Security, the first publication
. Competitive advantage, which ensures customer released under the Business Model for Information SecurityTM
acquisition (BMISTM),6 which addresses information security from a
. Brand name value preservation, which ensures customer business perspective, and in 2010, the full model was published
retention as The Business Model for Information Security.

2 ISACA JOURNAL VOLUME 1, 2011


Other standards include the Payment Card Industry Data Step 3: Risk managementThe result of the risk analysis
Security Standard (PCI DSS),7 a set of requirements for is a prioritization of risk in relation to the impact level
enhancing payment account data security, and the Special (the result of the business impact analysis) and the
Publications (800 series) of the US National Institute of identification of possible security measures for addressing
Standards and Technology (NIST),8 which are documents of the risk. The risk management processthe selection of
general interest to the computer security community. appropriate security measures for addressing the risk or
The aforementioned standards provide an indicative for risk transferring or acceptanceis determined by the
view of the information security standards landscape. Other management of the lottery.
standardization bodies and associations provide their own Step 4: ISMS implementationAfter the controls have
guidelines in the field. In addition, technical security best been selected, they should be correlated under a common
practices of system vendors provide additional guidelines. ISMS. This correlation requires deep understanding of the
The modern lottery sector has to select the information operation of the lottery; consideration of human, cultural,
security standards to use as a basis for its security technical, business and external factors; and continuous
architecture, and it must customize this selection according improvements.
to its specific business needs.
BMIS
Basic Processes One of the most recent information security frameworks that
Studying the information security standards horizontally, a addresses information security from a business point of view
number of basic processes/steps that lead to the identification is ISACAs BMIS, illustrated in figure 1.
of information security requirements are identified, including:
Step 1: Business impact analysisEach lottery business Figure 1BMIS
process is recorded and analyzed in terms of business
impact from the realization of a possible security threat. ORGANISATION
Design/Strategy
For example, the monetary, reputational or legal impact is
calculated in the scenario that a container of instant tickets
(also known as scratch cards, used for games in which the
GOVERNING

players instantly know if they have won or not) is stolen.


AR

The lottery must answer a number of questions to calculate


CH
RE

ITE
U
LT

the impact, for example:


CT
CU

UR
E

How much would this cost the lottery in monetary terms? PROCESS

ENA
What would be the indirect costs (e.g., from reputation E BLI
ENC NG
RG &S
loss) if the stolen tickets are sold? EME UPP
ORT
What would be the legal implications, if any? PEOPLE TECHNOLOGY
HUMAN FACTORS
Business processes are then prioritized based on an impact
scale that identifies the most critical issues.
Step 2: Risk analysisDuring this process, the possibility
Source: ISACA, An Introduction to the Business Model for Information Security,
for the occurrence of a security incident is calculated, based USA, 2009; adapted from the University of Southern California (USC) Marshall
on a database of security weaknesses. The risk analysis School of Business Institute for Critical Information Infrastructure Protection

takes into account technical and procedural parameters,


for example: The following definitions of the BMIS elements (derived
Are there technical controls in place to cancel the set of from An Introduction to the Business Model for Information
stolen instant tickets? Security)9 are necessary for understanding how BMIS works:
Do procedures exist to complement the technical security Organization design and strategyAn organization is a
controls (e.g., timely theft identification during the network of people, assets and processes interacting with each
shipment process)? other in defined roles and working toward a common goal.
ISACA JOURNAL VOLUME 1, 2011 3
PeopleThe people element represents the human Strategic plan execution, including a strategy definition as a
resources and the security issues that surround them. It result of business analysis (e.g., information security analysis
defines who implements (through design) each part of the in the life cycle of a new game development); resource
strategy. It represents a human collective and must take into management; and lottery operations are controlled by the
account values, behaviors and biases. executive committee that monitors security performance,
ProcessProcess includes formal and informal mechanisms value delivery and risk levels of all integrated information
(large and small, simple and complex) to get things done. security controls. This structure provides a good practice
TechnologyThe technology element is composed of all for expressing management commitment and control, having
of the tools, applications and infrastructure that make information security as a top priority in the operation of
processes more efficient. the lottery.
To understand the operation of BMIS in practice, it is Architecture is based on a lottery-specific threat model
important to study the links connecting organization design that serves the security requirements of all critical business


and strategy, people, process, processes as identified through governing. For example,
and technology. The following there are technical controls in place for protecting game
To understand the case study provides an example integrity, controlling access to lottery business reports,
operation of BMIS of the operation of the model in securely managing game configuration, establishing secure
the lottery sector. communication lines for game transactions (communication
in practice, it is
between the central system and terminals at the point of sale),
important to study Following a Holistic Approach isolating the computer room physically and ensuring game
the links connecting As an innovator in the lottery continuity by the implementation of a disaster recovery site.
organization design information security field, Enabling and support represents how security processes
GIDANI has implemented a are automated by the use of technology, and also which
and strategy, business model to understand processes are used to complement automated security controls
people, process, and


and to more deeply address its and to evaluate and improve them. GIDANI has automated
technology. information security needs and all lottery-related processes by the deployment of the lottery
to make them an integral part of system. Transaction engine (ticket processing) security
its business processes. configuration, support and operation are implemented by
GIDANI has deployed a customized ISMS, following a a number of written and continuously improved processes.
combination of international security standards. The GIDANI Simultaneously, there is a security technology evaluation
ISMS includes all rules, procedures and information security process in place that is used for calibrating and extending
management principles regarding security organization, lottery system security for addressing business needs. For
asset management, human resources security, access control, example, the business need for providing Internet gaming
physical security, communications security, operations goes through a security assessment of the current technology.
security, compliance, incident management, business In this assessment, automation controls are identified
continuity management and system security, covering its (such as the player identity management mechanism) and
whole development life cycle. Moreover, specific procedures complemented by manual procedures (e.g., review of player
have been applied regarding lottery game integrity and instant access rights) following official GIDANI rules. Since selling
ticket security. The following paragraphs outline how the lottery games through the Internet has been identified as a key
dynamic interconnections of BMIS (noted in bold) relate to business enabler in governing, information security controls
the GIDANI ISMS. have become a priority.
Information security at GIDANI is an integral part of the Human factors affect both architecture and enabling and
business strategy of the lottery. Governing all information support. For example, if an operator at GIDANI is managing
security activities is the responsibility of an executive roles within the lottery ticket sales monitoring application,
committee chaired by the chief executive officer (CEO). this operator may find the role management system too

4 ISACA JOURNAL VOLUME 1, 2011


cumbersome and complex to use (human factors). This is developments and patterns that arise in the course of process
reported as feedback to the security officer, who asks for the execution by people.10 While no one can ensure the absence
assessment of the whole process and technology (enabling of security incidents, there are solutions through the study of
and support) to identify opportunities for improvement. This emergence that limit the possibilities to a minimum level. For
assessment will take into account the whole architecture example, a strong security culture, as described previously,
as well, identifying the impact on other components of the permits GIDANI to have on-time reporting of security
system. One improvement may relate to the extension of the incidents. After reporting, the root-cause analysis process, in
security training program of GIDANI. Another may relate to which the actual reasons for the realization of the incident are
the reconfiguration of the security control or its replacement. identified and corrective actions are implemented, takes over.
Culture is an element of the GIDANI security model For example, a security operator, due to increased stress,
that has a tremendous positive effect in making information may assign incorrect access rights to a retailer manager (one
security work in practice. GIDANI is characterized by a who monitors the status of retailers). This will be reported to
clear set of hierarchy levels with the roles of each level the security officer through the processing of alerts and logs
having been defined accurately and supported by specific (potential access to critical information) and by the role that
operational procedures. The management model, as defined monitors security records (for every change in user access rights

by the governing dynamic a signed form is required). One could assume that this was an
While no one can interconnection, encourages unpredictable event (stressed employee). The truth, however,
free communication at all levels may relate to an increased workload in defining access rights
ensure the absence of personnel, and especially caused by a major change in the lottery system, which, in turn,
of security incidents, encourages feedback on the makes the user access management procedure too difficult
there are solutions security operations. That to implement and no longer effective. Through the study of
means that GIDANI has low emergence, within the framework of the model, GIDANI is in
through the study of power distance in terms place to link architectural changes with human factors (usability
emergence that limit of free communication of of security controls), enabling and support (combination of
the possibilities to a information security matters technical and procedural controls), and governing (limited


from the bottom to the top of number of employees in relation to the workload), and to
minimum level.
the hierarchy. For example, if correct the user access management procedure on time.
employees identify difficulties Even then, people will continue to insert uncertainty in the
in implementing a security process or using a security security processes, and some security incidents will still be
technology, they freely report it to the security officer to unavoidable. Through the operation of the model, however,
investigate the improvement of the process. At the same time, the whole picture of information security will become clear,
if employees identify a security incident (e.g., confidential providing the opportunity to security experts to learn more
gaming information left in a meeting room), they report accurately from mistakes and improve information security.
it immediately as a security incident. This reporting is not
translated as an offensive action between employees, but Conclusion
instead as a collective action, giving the opportunity to Information security will be understood, provide added value
management to take preventive or corrective actions. and effectively contribute to the operation of an organization
Emergence is one of the most important dynamic only if it is designed and implemented as a core ingredient
interconnections of the business model since it deals with the of the business strategy. Stakeholder, shareholder and player
uncertainty factor in information security at GIDANI. Due to trust are the key ingredients of information security in the
human nature, the execution by people of processes within a lottery sector, unveiling its societal, business and legal nature.
corporation cannot be characterized as deterministic. Despite Organizations from other sectors should identify such key
the detailed procedures, people sometimes act in an ad hoc ingredients similarly for providing a business definition to
manner and make mistakes. Emergence can be defined as the information security.

ISACA JOURNAL VOLUME 1, 2011 5


While technical security controls are important, what 2
 orld Lottery Association, www.world-lotteries.org
W
distinguishes a typical information security management 3
International Organization for Standardization, www.iso.org
system from an effective one is the ability to correlate all 4
ISACA, Risk IT: Based on COBIT, www.isaca.org/riskit
parameters in the operation of an organization, especially 5
ISACA, COBIT, www.isaca.org/cobit
the human factor. While absolute information security is 6
ISACA, Business Model for Information Security (BMIS),
theoretically unachievable, lotteries and organizations alike www.isaca.org/bmis
have the ability to reduce uncertainty and to continuously 7
PCI Security Standards Council, Payment Card
improve their approaches to making information security a Industry Data Security Standard (PCI DSS), www.
business enabler. pcisecuritystandards.org/security_standards/pci_dss.shtml
8
National Institute of Standards and Technology (NIST),
Endnotes Computer Security Division, Computer Security Resource
1
International Organization for Standardization, Center, Special Publications (800 Series), http://csrc.nist.
ISO/IEC 27001:2005, Information technologySecurity gov/publications/PubsSPs.html
techniquesInformation security management systems 9
Op cit, ISACA, BMIS
Requirements, 2005 10
Op cit, ISACA, BMIS

6 ISACA JOURNAL VOLUME 1, 2011

You might also like