Header

Search

Information Security

What is the difference between information security and IT security?

To put it simply: Information security protects all relevant information (we call it data when stored) and is therefore a specialized task, while IT security is primarily concerned with protecting IT systems, networks and their security.

Grid containing content elements

Basic Overview of IT Security and Information Security Topics

More about Basic Overview of IT Security and Information Security Topics

Obviously, the distinction cannot be drawn with the sharpness and clarity suggested by this overview. However, the chart shows the different focus of the two security disciplines. While IT security primarily focuses on protecting your systems and devices, information security focuses on the information required to fulfill the university's core tasks.

Standards and the Eight Pillars

More about Standards and the Eight Pillars

The eight pillars are based on the ISO 27001 standard and the NIST cybersecurity framework (or ICT minimal standard in Switzerland).

The pillars governance nad party Management and Identify are based on the ISO standard, the others are meinly based on the NIST standard.

The Eight Pillars of Information Security

More about The Eight Pillars of Information Security

The pillars are based on the ISO 27001 standard and the NIST cybersecurity framework.

These lists are not exhaustive or complete.

Cybersecurity resilience

Cybersecurity resilience, i.e., how lightly we get off in the next cyber incident, depends on many factors:

  • How well we are prepared for an incident
  • How quickly we detect an incident (the sooner, the better)
  • How well we (can) respond to the incident
  • How quickly we return to normal

 

  • Preparation: This includes topics such as organization and the creation of and compliance with guidelines (governance) and dealing with risks and suppliers, a systematic approach, and the behavior of all of us with regard to cybersecurity (management).
    It also includes topics such as identifying and protecting critical information (identify) – where is it stored and how important is it for our core tasks? How well are the information and our IT resources protected against cyber incidents? (Protect).
  • Detection: In order to successfully defend against cyber incidents, it is essential to detect them as early as possible. This is where our collective awareness and reporting to the service desk help. In addition, the entire UZH network and certain central services are permanently monitored by ZI IT Security (monitoring by the SOC) and specifically searched for known current attacks (hunting), which we receive from other universities, among others.
  • Responding to incidents: How well prepared are our defenses? How can we contain the spread of the problem, minimize damage, and exclude potential attackers? (Respond) This also includes appropriate communication during an incident in order to provide as much information as possible without revealing too much to the attackers.

  • Return to normal: The goal of information security and IT security is to return to normal working conditions as quickly as possible. (Recover)