Cyber and Electronic Security Risks Flashcards
What is Cyber Crime?
Cyber Crime is any offence committed using computer devise, networks, the internet and telecom systems. It is estimated that cyber-crime costs up to $400 billion per year.
- 1981 – felon attempts to break into AT&T computers
- 1988 – attempted cyber theft of £70m from First National Bank of Chicago
- 1995 – first recorded incident of phishing
- 2003 – ‘Titan Rain’ launches APT attack on American computers
- 2010 Stuxnet worm is discovered
What types of Cyber Crime Threats are there?
- Identity Theft – using a stolen identity to derive benefit
- Computer Fraud – using computers to commit fraudulent activity
- Denial-of-Service (DoS) attacks – making computer or network unavailable
- Phishing – persuading people to divulge personal data
- Pharming – redirecting website traffic to a bogus website
- Software Piracy – illegally using, copying or distributing software
- Cyber Espionage – obtaining info without the permission of the info owner
- Hacking – gaining unauthorised access to systems, networks and databases
What are the risks to governments from Cyber Crime?
- Disruption to utilities – water, power and heating utilities are prime targets for cyber-crime due to the disruption that outage can cause
- Infiltration of the financial system – disruption to a national banking system could bring a country to a standstill, as no money could exchange hands
- Theft of government secrets – stealing government data such as social security, tax records and military details
- Cyber War – attacking another country through systematic cyber-attacks on the infrastructure of the enemy
What are the risks to companies from Cyber Crime?
- Loss of intellectual and business confidential information
- Loss of sensitive business information including possible stock market manipulation
- Opportunity costs including service and employment disruptions, and reduced online trust
- Reputational damage
- Cyber-crime related monetary losses
- Additional cost of securing networks, insurance and recover from cyber attacks
What are the risks to individuals from Cyber Crime?
- Liability and compensation claims – incorrect, misleading or illegal statements can lead to an individual being sued for compensation and reputational damage
-
Identity Theft
- Stealing money from bank accounts
- Opening new lines of credit
- Gaining access to social security benefits
- Providing an alias if arrested
- Gaining employment
- Physical loss of technology – technology is used as part of people’s everyday working life. Disruptions caused by cyber-crime can be costly
What Guidance is available against Cyber Crime?
GCHQ Guidance:
- Home and mobile working policy
- User education and awareness
- Incident management
- Information risk management regime
- Monitoring
- Manage user privileges
- Removable Media Controls
- Secure configurations
- Malware protection
- Network security
CBEST (BoE framework - tests Bank defences) Guidance:
- Banks should use cyber threat intelligence including that from CBEST
- Banks should undertake tests that mimic real cyber attacks
- Banks should undergo a best practise cyber test audit
- Banks should sign up to a code of conduct
CPNI Guidance:
- Maintain an inventory of authorised and unauthorised software
- Ensure secure configurations
- Continuous vulnerability assessment and remediation
- Malware and virus defences
- Data recovery capability
- Controlled use of administration privileges
- Incident response and management
- Secure network engineering
List Cyber Attack Methods.
- Social Engineering – using deception to gain information from people that is then used to gain access to computer systems
- IP Spoofing – gaining access to a computer by sending the computer messages that are interpreted as coming from a trusted source
- Spam – unsolicited emails sent to infect a computer with malware or direct the computer to an illegal website
- Advanced Persistent Threats (APTs) – use the latest malware techniques to systematically attack target computers
- Botnets and Zombie Computers – automated programs that take unauthorised control of computers
How does one help Prevent Cyber Threats?
Prevention:
- Educate all computer users
- Choose strong, secure passwords
- Regularly update computer security
- Encrypt sensitive data
- Use the latest firewall and anti-virus/malware software
- Remember that cyber crime can affect anyone
Policy – NSIT cyber security framework is based around 5 core functions:
- Identify
- Protect
- Detect
- Respond
- Recover
Core functions are designed to help management deal with cyber risks.
Governance:
- Consider the privacy implications of cyber security
- Cyber security personnel must be appropriately trained and report to appropriate management
- Processes should be in place to support cyber security compliance and controls
What is Cyber Incident Planning?
- Incident Taxonomy – plan terminology should be standardised
- Data-classification Frameworks – incident response categories should be based on different types of data held
- Performance Objectives – clear response objectives should be set for each incident and data type
- Definition of Response Operating Models – roles, responsibilities and escalation process
- Identification and Remediation of Failure Models – plan must be enhanced to respond to new failure modes
- Key Tools for use during Incident Response – provides checklists for individuals