Chapter 9 - Cyber Security processes Flashcards
Cybersecurity risk governance structure:
- Org’s should have formal, codified policy statement outlining cybersecurity aims which should be overseen by board
Considerations for cybersecurity policy:
- Hiring + developing qualified personnel to manage cybersecurity risks effectively (chief financial officer)
- Connection between cybersecurity and org’s integrity and values
- Board to oversee cybersecurity risks – via dedicated committee, CIO or included in terms of audit committee
- Monitoring + reporting of performance by board to ensure policy is successful
- Consider org’s tolerance to cyber-risks and connections between cybersecurity and other risks
Developing a cybersecurity policy:
Involves normal risk management procedures – identification, quantification, prioritisation of risks, costing, selection and implementation of counter measures and drawing up contingency plans
Risks management for vendors and business partners:
- Involves identify, assess, respond and view risk from three different perspectives
Strategic perspective of managing risks from vendors and business partners:
Cybersecurity risk procedures should identify macro-level risks from third parties:
- National attack – treats that affect org’s across one or more countries
- Zero-day threats
- Major disruptions to operations
Operational perspective of managing risks from vendors and business partners:
- Identifying the current and future cybersecurity risks to core services provided by third parties
- This includes risks from suppliers that handle data processing
- Need to review technical and admin threats to network security and insider threats from malicious staff
- Due diligence for third parties before appointment and ongoing monitoring through SLA
Financial perspective of managing risks from vendors and business partners:
- Focus on relevant risks and quantified costs from individual threats
- By quantifying risks, the org will prioritise resources and set targets for suitable risk responses to improve security posture
CIMA strategies to avoid being hacked:
- Reconnaissance:
* Being aware of how you appear to outsiders
* If you look vulnerable – why is this and what can you do about it? - Simulation:
* Assume that you will be hacked at some point
* What should you do to prepare yourself? - Digital identity:
* Find ways to identify everyone and everything that interacts with you digitally to prepare
What is the Internet of things?
* Internet of things = network connecting objects in the physical world to the internet Examples: * Smart TV’s * Fitness trackers * Utilities meters * Kitchen appliances
Risks of internet of things:
- Allows org’s to manipulate users by analysing their behaviour and using them for commercial purposes
- When updating or registering device IoT created cybersecurity threats such as malware and data loss or access to devices remotely
How should org’s communicate cybersecurity policies?
- Communicated via a formal policy statement that is straightforward to understand and for both internal and external stakeholders
- Cybersecurity training should also be part of policy commitment to improve and for it to be delivered appropriately
- Org’s may commission formal mandatory training to ensure that digital resilience are raised across all relevant services involved in info and data management
BPP’s cybersecurity risk management program:
- Information security management system:
* High level risk management framework, policies and procedures - Business continuity planning:
* Disaster planning - Physical + environmental security:
* Aim to address risks from social engineering - Starters, leavers and movers process:
* Getting staff set up to use system, adapting access for staff moving to new department or role and stopping access when people leave - Supplier management:
* Risk based – third-party IT service supplier should be prioritised above stationary supplier as they pose greater risk - Asset management:
* Recovering assets from leavers, allowing access only to those who need it and protecting valuable assets - Information governance:
* Ensure people know which info is confidential, what is publicly available and what is internal only - Training and awareness:
* Making all employees aware of importance of programme and their responsibilities in maintaining it
Protection against malware:
- Anti-virus software
- Personnel policies = staffs IT training + disciplinary procedures against staff who use unauthorised software
- Protect external email links by virus checking all messages and preventing files of a certain type being sent via email
What is legacy systems?
Systems that have grown organically over time rather than being specifically designed
What is a patch?
Software update that addresses know vulnerabilities (bug fix)
Patch management:
- Patch management can be used as a preventative control (vulnerability is spotted before any damage) and as a detective control (in response to cybersecurity breach)
- Patches need to be applied as they are required to reduce risk that vulnerabilities will be exploited
- Given the cost and expertise required as well as complexity of legacy systems, this is an area that the org cannot afford to ignore
What does encryption involve?
- Encryption = scrambling data at one end of a communication channel, transmitting the scrambled data and unscrambling it at receiver’s end
- Aims to ensure security of data during transmission
- To read an encrypted file, you require access to security key or password to decrypt it
- Unencrypted data = plain text, encrypted data = cipher text
- Only secure way to prevent eavesdropping
Encryption techniques:
- Digital signature:
* Encryption by means of private keys ensuring sender is who they claim to be and providing evidence - Digital envelope:
* Sending key used to encrypt the message separately form encrypted message - Authentication:
* Making sure message has come from an authorised sender
* Involves adding an extra field to a record which contents are derived from the remainder of the record to which an algorithm is applied - Dial-back security:
* Requires person to dial into network and identify themselves
* The system then dial the person back before allowing access
Firewalls:
- Firewall = protect part of the communications technology to prevent unwelcome access into computer system
- Allow public access to some parts of computer systems, while denying access to other parts
- Access to rest of system is controlled by passwords
- Skilled hack may be able to bypass these precautions
Email policies:
- Sending of confidential info to external sources should be prohibited or sent through encrypted or password protected
- Employees should not delete sensitive emails and should keep hard copies
- Legal disputes should not be discussed over email
- Attachments and emails should be checked for viruses
- Security software should be used to analyse attachments – electronic limits can also be placed on types of attachments
Logical access systems prevents access by measures such as:
- identification of user
- authentication of user identity
- checks on user authority
Passwords:
- Systems does not allow access, terminal may lock and the attempted unauthorised access should be recorded
- Keeping track of failed attempts can alert managers to repeated efforts to break into the system
Back-up controls:
- Ensure that most recent useable copy of data can be recovered and restored in event of deliberate or accidental loss or corruption
- Forms part of contingency controls and should also be part of day-to-day procedures
- Back-ups should be stores in separate secure location
Disaster planning:
- Information contingency planning involves response protocols that consider various risk eventualities that org may be asked to cope with and how they should respond to them
- Protocols are often practiced via simulations to ensure staff are adequately trained and that protocols are fit for purpose