Information Security Management
- Information security is a critical and huge topic encompassing cyber-risk measurement and assessment.
- Effective security involves communication and education for both employees and consumers.
- A common language is needed to discuss risk, attack, and defense strategies.
- Cyber-risk models are in early stages and require a shared knowledge base.
- Quantifying cyber risk involves understanding the business, state of controls, and potential reputational damage and recovery costs.
- Anonymity is key for data sharing within trusted circles to address complexity in data valuation.
Progression of Threats
- The Industrial Revolution has progressed through four stages, each introducing new cyber and physical threats:
- Industry 1.0: Steam-based mechanical production.
- Industry 2.0: Electricity-based mass production.
- Industry 3.0: Controller-based automation.
- Industry 4.0: Ubiquitous production and control with online-ordered mass customization.
Odds and Costs of Data Breaches
- The probability of experiencing a data breach is 1 in 4.
- A significant percentage (87%) of breaches occur in minutes or less.
- Cyber attacks can cost small-to-medium businesses an average of 2,640,000.
- 60% of businesses go out of business within 6 months of a cyber attack.
- The average total cost of a data breach is highest in the United States (7.91m).
- The goal is to block threats using safeguards, addressing vulnerabilities to prevent loss.
- The EU General Data Protection Regulation (GDPR) covers all personal data, defines data protection rights, introduces new obligations, and applies worldwide.
- California Consumer Privacy Act (CCPA) has similar provisions to GDPR, including consumer rights to demand disclosure of collected personal information.
- Regulations extend to Internet-of-Things (IoT) devices, requiring reasonable security features.
Privacy and Confidentiality
- Privacy is the right to be left alone and control personal possessions without unwanted observation.
- Confidentiality ensures that messages and information are available only to authorized individuals.
- Common workplace abuses include surfing the internet and sending personal emails during work hours.
- Organizations monitor web visits, block websites, review emails, and track keystrokes.
- Email privacy policies are essential to mitigate risks associated with email and messaging.
Threat Landscape
- The perimeter is gone; data is everywhere, and threats are sophisticated.
- The attack surface is expanding to endpoints, networks, cloud, users, mobile devices, and IoT.
- The modern threat landscape includes malicious insiders, terrorists, organized crime, and nation-states.
- A well-established cyber-crime economy exists with varying prices for compromised data and services.
- Attacks are creative and sophisticated, including spear-phishing, custom malware, and social engineering.
Malware and Mobile Threats
- Malware types include viruses, trojans, worms and beacons, leading to symptoms like slow system startup and unusual disk activity.
- Top mobile threats include web-based attacks, malware, resource abuse, data loss, and social engineering.
Bots and Botnets
- Bot: A computer program that executes specific tasks according to instructions.
- BotNet: A network of compromised computers forwarding transmissions.
- BotHerder: A hacker controlling compromised computers.
HTTP/2 Rapid Reset Botnets
- Leverage cloud computing platforms and exploit HTTP/2 to generate up to x5,000 more force per botnet node.
- This allows hyper-volumetric DDoS attacks with small botnets.
Data Breaches
- Largest Hacking and Identity Case: Albert Gonzalez indicted in August 2009.
- Worst breaches include Yahoo, Heartland Payment Systems and TRW.
Security Safeguards
- Five IS Components: Hardware, Software, Data, Procedures, People.
- Technical Safeguards: Identification, Authorization, Encryption, Firewalls and Malware protection.
- Data Safeguards: Data rights, responsibilities and Backup and recovery.
- Human Safeguards: Hiring, Training, Education, Procedure design, Administration, Assessment, Compliance and Accountability.
Internal Threats
- Most security incidents originate within the organization.
- Employees misuse their access, leading to business-affecting incidents.
- Ignoring internal threats, careless behavior, insider collusion, and malicious intent are significant risks.
- Remote workers present risks due to personal use of work computers and uncertain security control.
Lines of Defense
- First Line: People (develop, communicate, identify, test and obtain stakeholder support).
- Second Line: Technology (Authentication, Authorization, Prevention, Resistance, Detection and Response).
Security Measures
- Authentication (something you know, have, or are).
- Security Monitors (intrusion detection).
- Prevention and Resistance (Content filtering, Encryption and Firewalls).
- Content Filtering (prevent transmission of sensitive info).
- Encryption (scrambles information).
- Firewalls (prevent security breaches).
- Businesses need Secure Networks (Virtual Private Networks (VPNs)).
- Email Security (anti-spam, anti-phishing, anti-spoofing and anti-virus protection).
Security Policy
- Security Policy for In-House Staff (position definition, separate duties and authorities, hiring and screening).
- SIEM (Security Information & Event Management).
- Policies include Cybersecurity policy, Ethical computer use policy, Information privacy policy, Acceptable use policy, E-mail privacy policy and Internet use policy.