Information security culture
Information security
culture
Employee behavior can have
a big impact on information security in organizations. Cultural concepts can
help different segments of the organization work effectively or work against
effectiveness towards information security within an organization.″Exploring
the Relationship between Organizational Culture and Information Security
Culture″
provides the following definition of information security culture: ″ISC
is the totality of patterns of behavior in an organization that contribute to
the protection of information of all kinds.
Andersson and Reimers
(2014) found that employees often do not see themselves as part of the
organization Information Security "effort" and often take actions
that ignore organizational Information Security best interests. Research shows Information security culture
needs to be improved continuously. In ″Information Security
Culture from Analysis to Change″, authors commented, ″It′s
a never ending process, a cycle of evaluation and change or maintenance.″
To manage the information security culture, five steps should be taken:
Pre-evaluation, strategic planning, operative planning, implementation, and
post-evaluation.
- Pre-Evaluation: to identify the awareness of information security within employees and to analyze the current security policy.
- Strategic Planning: to come up with a better awareness program, clear targets need to be set. Clustering people is helpful to achieve it.
- Operative Planning: a good security culture can be established based on internal communication, management-buy-in, and security awareness and a training program.
- Implementation: four stages should be used to implement the information security culture. They are commitment of the management, communication with organizational members, courses for all organizational members, and commitment of the employees.
Systems at risk
The growth in the number of
computer systems, and the increasing reliance upon them of individuals,
businesses, industries and governments means that there are an increasing
number of systems at risk.
Financial systems
The computer systems of
financial regulators and financial institutions like the U.S.
Securities and Exchange Commission, SWIFT, investment banks, and
commercial banks are prominent hacking targets for cybercriminals interested in
manipulating markets and making illicit gains. Web sites and apps that accept
or store credit card numbers,
brokerage accounts, and bank account
information are also prominent hacking targets, because of the potential for
immediate financial gain from transferring money, making purchases, or selling
the information on the black market In-store
payment systems and ATMs have
also been tampered with in order to gather customer account data and PINs.
Utilities and industrial
equipment
Computers control functions
at many utilities, including coordination of telecommunications,
the power grid, nuclear power plants,
and valve opening and closing in water and gas networks. The Internet is a
potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment
controlled by computers not connected to the Internet can be vulnerable. In
2014, the Computer
Emergency Readiness Team, a division of the Department of
Homeland Security, investigated 79 hacking incidents at energy
companies. Vulnerabilities in smart meters (many of which use local radio or
cellular communications) can cause problems with billing fraud.
Aviation
The aviation industry is very reliant on a series of
complex system which could be attacked A
simple power outage at one airport can cause repercussions worldwide, much of the system relies on radio
transmissions which could be disrupted, and controlling aircraft over oceans is
especially dangerous because radar surveillance only extends 175 to 225 miles
offshore. There is also potential for attack from within
an aircraft.
In Europe, with the (Pan-European
Network Service) and NewPENS, and in the US with the NextGen program, air navigation
service providers are moving to create their own dedicated networks.
The consequences of a
successful attack range from loss of confidentiality to loss of system
integrity, air traffic control
outages, loss of aircraft, and even loss of life.
Consumer devices
Desktop computers and
laptops are commonly targeted to gather passwords or financial account
information, or to construct a botnet to attack another
target. Smart phones, tablet computers, smart watches, and other mobile devices such as quantified self devices like activity trackers have sensors such as cameras,
microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may
collect personal information, including sensitive health information. Wifi,
Bluetooth, and cell phone networks on any of these devices could be used as
attack vectors, and sensors might be remotely activated after a successful
breach.
The increasing number of home automation devices such as the Nest thermostat are also potential targets.
Large corporations
Large corporations are
common targets. In many cases this is aimed at financial gain through identity
theft and involves data breaches such as
the loss of millions of clients' credit card details by Home Depot, Staples, Target Corporation, and the most recent breach of Equifax.
Some cyberattacks are
ordered by foreign governments, these governments engage in cyberwarfare with the intent to spread their
propaganda, sabotage, or spy on their targets. Many people believe the Russian
government played a major role in the US presidential election of 2016 by using
Twitter and Facebook to affect the results of the election, whether that is
true or not will ultimately be determined by congress.
Medical records have been
targeted for use in general identify theft, health insurance fraud, and
impersonating patients to obtain prescription drugs for recreational purposes
or resale.
Although cyber threats
continue to increase, 62% of all organizations did not increase security
training for their business in 2015.
Not all attacks are
financially motivated however; for example security firm HBGary Federal suffered a serious series of
attacks in 2011 from hacktivist group Anonymous in retaliation for the firm's CEO
claiming to have infiltrated their group, and in the Sony Pictures attack of
2014 the motive appears to have been to embarrass with data leaks,
and cripple the company by wiping workstations and servers.
Automobiles
Vehicles are increasingly
computerized, with engine timing, cruise control, anti-lock brakes, seat belt tensioners, door
locks, airbags and advanced
driver-assistance systems on many models. Additionally, connected cars may use Wif-Fi and bluetooth to
communicate with onboard consumer devices and the cell phone network. Self-driving cars are expected to be even more
complex.
All of these systems carry
some security risk, and such issues have gained wide attention. Simple examples of risk include a malicious compact disc being used as an attack vector, and the car's onboard microphones being used
for eavesdropping. However, if access is gained to a car's internal controller area
network, the danger is much greater – and in a widely publicised 2015 test,
hackers remotely carjacked a vehicle from 10 miles away and drove it into a
ditch.
Manufacturers are reacting
in a number of ways, with Tesla in 2016 pushing
out some security fixes "over the air" into its cars' computer
systems.
In the area of autonomous
vehicles, in September 2016 the United
States Department of Transportation announced some initial safety
standards, and called for states to come up with uniform policies.
Government
Government and military computer systems are commonly attacked
by activists and foreign
powers. Local and regional
government infrastructure such as traffic light controls, police and intelligence
agency communications, personnel
records, student records, and financial systems are also potential
targets as they are now all largely computerized. Passports and government ID cards that control access to facilities which
use RFID can be vulnerable to cloning.
Internet of things and
physical vulnerabilities
The Internet of things
(IoT) is the network of physical objects such as devices, vehicles, and buildings
that are embedded with electronics, software, sensors, and network connectivity that enables them to collect
and exchange data – and concerns have been raised that this is
being developed without appropriate consideration of the security challenges
involved.
While the IoT creates
opportunities for more direct integration of the physical world into
computer-based systems, it
also provides opportunities for misuse. In particular, as the Internet of
Things spreads widely, cyber attacks are likely to become an increasingly
physical (rather than simply virtual) threat. If a front door's lock is connected to the
Internet, and can be locked/unlocked from a phone, then a criminal could enter
the home at the press of a button from a stolen or hacked phone. People could
stand to lose much more than their credit card numbers in a world controlled by
IoT-enabled devices. Thieves have also used electronic means to circumvent
non-Internet-connected hotel door locks.
Medical systems
Medical devices have either been successfully
attacked or had potentially deadly vulnerabilities demonstrated, including both
in-hospital diagnostic equipment and implanted devices including pacemakers and insulin pumps. There are many reports of hospitals and
hospital organizations getting hacked, including ransomware attacks, Windows XP exploits, viruses, and data breaches of sensitive data stored on
hospital servers. On 28
December 2016 the US Food and Drug
Administration released its recommendations for how medical device
manufacturers should maintain the security of Internet-connected
devices – but no structure for enforcement.
Impact of security breaches
Serious financial damage
has been caused by security breaches,
but because there is no standard model for estimating the cost of an incident,
the only data available is that which is made public by the organizations
involved. "Several computer security consulting firms produce estimates of
total worldwide losses attributable to virus and worm attacks and to hostile digital acts in
general. The 2003 loss estimates by these firms range from $13 billion (worms
and viruses only) to $226 billion (for all forms of covert attacks). The reliability
of these estimates is often challenged; the underlying methodology is basically
anecdotal." Security breaches continue to cost businesses
billions of dollars but a survey revealed that 66% of security staffs do not
believe senior leadership takes cyber precautions as a strategic priority.
However, reasonable
estimates of the financial cost of security breaches can actually help
organizations make rational investment decisions. According to the classic Gordon-Loeb Model analyzing the optimal
investment level in information security, one can conclude that the amount a
firm spends to protect information should generally be only a small fraction of
the expected loss (i.e., the expected value of the loss resulting from a
cyber/information security breach).
Attacker motivation
As with physical security, the motivations for breaches
of computer security vary between attackers. Some are thrill-seekers or vandals, some are activists, others are criminals
looking for financial gain. State-sponsored attackers are now common and well
resourced, but started with amateurs such as Markus Hess who hacked for the KGB,
as recounted by Clifford Stoll, in The Cuckoo's Egg.
A
standard part of threat modelling
for any particular system is to identify what might motivate an attack on that
system, and who might be motivated to breach it. The level and detail of
precautions will vary depending on the system to be secured. A home personal computer, bank,
and classified
military network face very
different threats, even when the underlying
No comments