D. Cyber risk Flashcards
(234 cards)
what are the types of sensitive information?
personal information
- personally identifiable information (PII)
- can either be on its own or with other info that can identify a single person
business information
- anything that may cause a risk to the company if discovered by an external party
- includes things like research data, marketing plans
classified information
-usually refers to information that a national government has put special restrictions on where disclosure could harm public safety and security
what are some examples of PII?
- names
- addresses
- DOB
- credit card numbers
- bank account numbers
- information about race/ethnicity
how can technology interact with an organisation?
TYPE of tech the company uses
-ERP, Data Centres
different ways the organisation is CONNECTED with technology
-VPN, routers, virtual servers
different SERVICE PROVIDERS the company uses
-cloud provider, software providers, call centres
how the company DELIVERS its product or service to the customer
-transmissions to vendors, online retail channel, wholesale customers
what is an ERP?
Enterprise Resource Planning
- link wide range of activities
- used ot automate work traditionally done by MA
what is a Data centre?
large group of networked computer servers that are usually used by organisations for storage, processing or distributing large amounts of data
what is a VPN?
virtual private network
- extends private network across a public network and enables users to send and receive data across shared or public networks as it their computing devices were directly connected to the private network
- often used by organisations whose staff work remotely so they can access shared data drives or intranet
what is a router?
networking devices that effectively direct the computing traffic between computer on networks
what is a virtual server?
modern server is now so powerful that having one server for a single function is very inefficient
servers can now perform multiple functions and can be located offsite and ofter controlled by a third party
resources the server provides are often used by multiple suers and each user can administer it as though they have complete control over it
what is the Cloud?
form of remote data storage
called cloud as storage could be at a great distance from the access point rather than locally stores
although it uses new tech, similar to olden day computing where large central computer owned and run by company (mainframe) held all data
what are the benefits of cloud storage?
only paying for the storage used
in-house staff are not required to maintain and protect the data
what are the costs related to cloud computing?
- remoteness can be a problem, if communications break down you cannot gain access to your data
- reliance on a third part to protect the integrity of the data
- sharing storage space with others which may compromise your data
where is collateral damage and access to confidential PII usually sold?
on the dark web
what is the dark web?
part of the internet that allows further anonymity
ability to obscure the source or location
-provides criminals protection
-‘fraud economy’
what are the 3 parts of the internet?
surface web (clear web) -everyday use, can find using search engine
deep web
- used everyday
- have to log in to access
dark web
- need special technology to access
- Tor browser/network
- increased use of encryption and use of obfuscation
how can criminals use PII?
big market for PII can use passwords for other sites can use this to build a user profile identity theft can sell profile to others
what was the 2017 global cyberattack called Notpetya?
targeted Ukraine on the eve of a national Urakranian holiday
- 80% of infections were in Ukraine
- several large businesses going offline
- Germany also badly hit, 9% infections
- collateral damage recorded across the world
what types of changes could affect cyber security risk management?
expansion
- adding manufactiong operation
- additional connection
acquisition
- different software and systems
- data loss
restructure
- undertake an internal restructure
- reporting lines change
hardware update
- rolling out any kind of update poses a risk as it means people will need to change the way they do things
- old hardware disposed incorrectly
regulations
- legal reqs or reg requirements can have an effect on cyber security risk management
- e.g. GDPR
how did Covid post a cyber security risk?
everyone had to work remotely
- emails and phishing rise
- malicious links passed around
what are changeover methods?
direct changeover
parallel running
pilot changeover
phased changeover
what is a direct changeover?
old system is switched off and then the new system is switched on
appropriate when the 2 systems are very different or it is too expensive to run both
also risky if the new system doesn’t work properly and they cant revert and will lose staff trust in new system
what is parallel running?
old and new systems run together for a period of time, until it is considered safe to switch the old system off
why is parallel running costly?
inputting data twice
possible employing more staff to do so
BUT less risky than direct changeover
what is pilot changeover?
where one part of the business changes over first
-this division could use parallel or direct changeover
once the system operated correctly there, the rest will change over
what are the pros and cons of the pilot changeover?
safer method of changeover as only one part of the business will be affected if anything foes wrong
however may be different issues with different parts of the business that fo unrealised at first