380 likes | 400 Views
Learn to critically analyze information security issues, identify tools for combating security threats, develop security policies, and understand legal implications. Week 1 focuses on securing data within digital systems.
E N D
Richard Henson University of Worcester September 2018 COMP3371Cyber Security
What this module is about • By the end of this module you should be able to: • Critically analyse the information security issues and threats facing both users and information managers in organizations • Identify and analyze methods, tools and techniques for combating security threats • Develop an information security policy for, and provide a strategy for implementation of that policy in an organization. • Explain the legal issues and implications with security.
Week 1 – Strategies for securing data held within digital systems • Objectives: • Explain the difference between “data” and information” • Explain why doing Cyber Security has become so hard • Know where to start when dealing with an organisation’s information security
Data… or Information? Meet me at… • Kids stuff? • the difference between the two is NOT obvious! • subtle but crucial - should be clearly understood… • Exercise in groups… • discuss what is (a) similar (b) different about data and information • give an example of digital data that could be categorised as (a) data and (b) information • be prepared to explain why each can be categorised as such…
Data… or Information? • All about context… • if on its own…. just numbers & characters • if linked to something else… really important information • Great confusion about this…
Scenario • Within the organisation/department a few bytes sent may be “just data” • employees may not see it as personal or sensitive • Relaxed attitude? • Outsider… still just data? • e.g. taken via a wireless link • With help from an internal “informer”… • context! Data becomes information
How Valuable is Data? (1) • Data breach • an external agency… • gets organisational data… • without permission • If what is compromised remains just “data”, perhaps a breach is not so serious… • data worthless without context
How Valuable is Data? (2) • However… • If the data becomes information… • it will have value… maybe a lot… • breach could be very serious indeed • Examples: • rival organisation gets corporate information … and uses that information to undermine the organisation (who knows?) • hacker accesses customer personal information (e.g. Ashley Madison)
How much is Data worth? • Organisation value… refers to monetary value • classically based on physical assets & trading • data or information not physical… • Classical model out of date? • What is the value of e.g. company database?
Black Market Value… • Information has intrinsic value • e.g. personal data record - • if contextualised, become “personal information” • worth e.g. £50 on the black market? • e.g. spreadsheet, confidential memo • could become financial or corporate information • may be worth a lot more than £50… • By contrast, data it only has potential value • just add context, though… and…
Anonymising Data • This is way to safeguard data by not including personal data directly • especially in any publicly accessible data • may be a key field that can link to the data if required • needs a higher level of access • If anonymised data falls into the wrong hands… no prob! Useless without key field
Keeping Data Secure • If data can easily become information, it needs to be kept safe… • Should be a prime concern for all organisations to take special care of any digital data of importance • could be contextualised to become information…
Once upon a time…, Digital Datanot accessible to users • Until 1980s, always held in expensive, secure computer areas • ONLY well-paid experts accessed computer operations • all completely beyond scope of an SME!
Nowadays, Data usually held Digitally • First came the PC… • then the PC network… • then portable storage device… and… • finally…. public access to the Internet!
Try securing this… data navigated round the Internet Over 1 biilion Internet servers!
Do Organisations understand this…? • “A Company like Yours?” • http://www2.deloitte.com/au/en/pages/risk/articles/cyber-video-companies-like-yours.html • Questions?
Mission Impossible? • or technically easy-peasy?
A new name for protecting the stuff that used to be on paper? • What needs to be secured; • Buildings, print-outs, etc. • covered by “Physical Security” • Current good practice • destroys the physical asset • replace it by digital… • Everything else is digital… • how about “Digital Security”?
Information Security? Or Data Security? • Matters relating to digital stuff referred to by organisations as “data security” • regarded as an IT matter • “Information Security” introduced to take account of contextualisation & human factors • 2009 on… became Cyber security • woke up to “cyber threats…”
Information Securityand Organisations • Nothing new! • organisations have always kept information • important to the extent that the organisation IS its information • loss of vital data could therefore be curtains for the organisation!!! • information kept very secure… • in fireproof, lockable, filing cabinets
Group Exercise • Define: • Data Security • Information Security • Cyber Security • Which of these terms would help SMEs (small/medium-sized enterprises)?
E-commerce from home… • Principles of good data management should be applied to a “leisure” computer at home connected to the Internet… • e.g. family members could get hold of each other’s information • The Internet has to be used when people buy products online… • Easy for a home computer to be hijacked!
Information Security: Technology & Management • Basic problem… • technology is useless if it goes wrong… • or people don’t use it properly… • organisations need specialists to keep technology working • need procedures so employees use technology correctly applies equally to IT!
Management of Information Security • IT infrastructure a major undertaking • technology has to work • staff (usually) have to be trained • data has to be managed • (Senior) Management... • often misconceptions about digital data and the costs of maintaining it • result: 3rd item less priority • digital data therefore not properly managed…
Reasons to look after Data: 1. Data Protection Act • All UK organisations that hold data on people must register with the Information Commissioner's Office (ICO) • criminal offence not to do so... • Personal data must be kept in accordance with eight principles of the Data Protection Act • not to do so can result in hefty fines • or even imprisonment
Reasons to look after Data: 1. The Law - continued • Financial data also covered under a slightly different law, through the Financial Services Authority (FSA)… • much more severe penalties than the ICO… • e.g. Nationwide fined in 2007 • approx £1million • e.g. HSBC fined in 2009 • £ several MILLION • e.g. Zurich Insurance fined 2010 • £ >1 million
2. Losses do not look good for the business… • If a business loses its data • it won’t be able to trade efficiently, or even at all! • estimation: 10 days maximum to recover, or out of business! • ALSO lose trade secrets, customer image, market share, reputation…
2. Losses & public sector, not-for-profit organisations • In practice… personal data often not given priority in protection • catastrophic sequence of errors that led to 25 million records being lost by HMRC in 2007 • Unsurprisingly… customers expect their personal data to be safeguarded • increasing concern about privacy in recent years • source of great embarrassment if data lost
The Threats to organisations… • Divides neatly into: • “internal” • “external”
Internal • Well-meaning employees not following procedures and misusing data or allowing it to get into the wrong hands…. • Employees or temps with bad intent…
External • Inside people or business partners accessing data from outside, and either accidentally or on purpose, misusing it • People hacking in from outside, usually via the Internet
Do we have a problem? • Perceptions “from the inside” quite different from “outside looking in”
Where to start? • Group Exercise…
Start the top…an Information Security Policy • As information is so important to organisations, security of information should be central to organisation’s strategic plan… • therefore part of organisational policy… • Problem: organisations (especially small ones) are very reluctant to do this…
How can organisations be encouraged to have a policy? • Over to you again…
An Information Security Policy • Fortunately, now becoming a commercial imperative for do any on-line business with a credit card • thanks to recent PCI DSS guidelines… • other information assurance schemes require this (e.g. ISO27001, COBIT, IASME) • more rigorously enforced by ICO • ONCE the organisation has finally accepted that they need a policy, they should base it on existing organisational strategy • can then implemented tactically and operationally through the organisational structure
“Stakeholders” of organisational Information Security? • Who should be responsible for what? • (no responsibility… no accountability) • Exercise again in groups…
Stakeholders • A number of jobs involve security of data in one way or another e.g.: • Data Controller (Data Protection Act) • Head of Personnel/HR • Department Heads (especially Finance) • Who should bear responsibility/carry the can?? • Difficult for organisations, but is… “The Boss” (!) • Can’t get ISO27001 without this acceptance… • http://www.iso.org/iso/home/standards/certification/home/standards/certification/iso-survey.htm