Week 11 Flashcards
Why do we need security and controls for Information systems?
IS share data and provide resources to lots of people including those who shouldn’t have access. Controls upon information systems are based upon two underlying principles:
– The need to ensure accuracy of data
– The need to protect against loss or damage
Why are systems vulnerable?
Summary : Human error, physical problems, computer crime and invasion of privacy
System complexity –Testing not extensive enough
Unauthorised access is always possible
Human error – People couldn’t be bothered with procedures - a system programmed to do checks will do all the time whereas sometimes people won’t. Don’t use virus checkers, etc., Fail to back up data
Poor audit means that nobody checks
What were the results of the cyber security survey 2017
48% of business have no cyber security policy in palce and 72% of small business network security is looked after by the owner, office manager or nobody
How might small companies deal with netwokr security management
In small companies, network security may not be anyone’s primary responsibility
and there many not be anyone with specialist training in that area.
Therefore, outsourcing or using cloud software may be safer as this is giving responsibility to specialists.
Whats the trend of % of IT spend on security? Why is this trend in place for IT spending?
IT spend on security is growing
Recent growth was driven by more extensive use of IT in the pandemic
- Electronic rather than physical interactions with customers
- Remote working by employees
Give examples/ statistics of cybercrime in Ireland
HSE Attack
Garda data says that in 2021 phishing and smishing is up over 1400% since last year- all cybercrime is up
Define cyber risk
Cyber Risk is the risk of any financial loss, disruption or negative reputational impact because of a failure in IT systems; whether through people, process or technology.
* risks emanating from the use of electronic data and its transmission, including tools such as the Internet
* physical damage caused by cyber-attacks;
* fraud committed by misuse of data;
* liability arising from data use, storage and transfer
* availability, integrity, and confidentiality of electronic information
Give examples of specific cyber risks
- Business interruption
- Contingent business interruption
- Data and software loss
- Intellectual property theft
- Network Security/Security
- Breach of Privacy Compensation
- Reputational Damage (excluding legal protection)
- Compensation for crisis management/remediation actions requiring internal or external experts
- Cyber ransom and extortion
- Financial theft and/or fraud
- Regulatory & Legal Defence costs
- Incident response costs
- Fine and Penalties
- Communication and media
Explain how to insure against cyber attacks
Most cyber-attacks are not covered by standard insurance policies, even though Cybercrime is the fastest growing criminal act in the world. But you can take out cyber insurance. However direct costs can be very considerable even with insurance and reputational damage is substantial. You can be held liable for third party data such a customer data or credit card data
What expenses does cyber insurance cover?
– Investigation: to determine what occurred, how to repair damage and how to prevent the same type of breach from occurring again
– Business losses: network downtime, business interruption, data loss recovery, repair/replace damaged equipment etc.
– Privacy and notification: to customers and other affected parties,
– Lawsuits and extortion: includes legal expenses for the release of confidential information, legal settlements and fines
Includes expert help in some cases - legal help consultancy support, liability support
Why is cyberinsurance not a mature market?
People are uncertain what the risks are and how to price the insurance
What are some simple measures everyone should do - cyber first aid
- Wi-fi: Change default router password, Don’t use public wifi without vpn
- Passwords: Secure devices with passwords, pins, biometrics, Use encryption and two factor authentication
- Back up data: Check the back ups work!
- Use antivirus software
- Review app permission
- Keep personal and work data separate
What are security planning principles
Risk analysis - balancing threat and protection costs for assets, goal is to reduce risk to an economically rational level.
Comprehensive security - close off all avenues of attack
Defence in depth - attacker should have to break through several lines of defence to succeed
Define internal audit
Internal Audit
Third force that checks the adequacy of the controls in place. This might include some external assistance from experts.
Explain risk management department
Centralised control of the enterprise, including compliance, legal, quality control and financial control.
What info must you know to have proper permissions in palce for ninformation systems
- What people do
- What data they produce
- What data they use