Need For Information Security
Need For Information Security
Information Security?
Infosec-IS3A
To prevent data breaches
A data breach is an incident where information is stolen or taken
from a system without the knowledge or authorization of the
system’s owner. A small company or large organization may suffer
a data breach.
Stolen data may involve sensitive, proprietary, or confidential
information such as credit card numbers, customer data, trade
secrets, or matters of national security.
To prevent data breaches
Most data breaches are attributed to hacking or malware attacks. Other frequently
observed breach methods include the following:
● Insider leak: A trusted individual or person of authority with access privileges
steals data.
● Payment card fraud: Payment card data is stolen using physical skimming
devices.
● Loss or theft: Portable drives, laptops, office computers, files, and other physical
properties are lost or stolen.
Most data breaches are attributed to hacking or malware attacks. Other frequently
observed breach methods include the following:
● Research
The attacker, having picked a target, looks for weaknesses to exploit: employees,
systems, or the network. This entails long hours of research on the attacker’s part
and may involve stalking employees’ social media profiles to find what sort of
infrastructure the company has.
● Attack
Having scoped a target’s weaknesses, the attacker makes initial contact either through
a network-based or social attack.
Phases of a Data Breach
In a social attack, the attacker uses social engineering tactics to infiltrate the
target network. This may involve a maliciously crafted email sent to an
employee, tailor-made to catch that specific employee’s attention. The email
can phish for information, fooling the reader into supplying personal data to the
sender, or come with a malware attachment set to execute when downloaded.
Phases of a Data Breach
● Exfiltrate
Once inside the network, the attacker is free to extract data from
the company’s network. This data may be used for either blackmail
or cyberpropaganda. The information an attacker collects can also
be used to execute more damaging attacks on the target’s
infrastructure.
Best Practices
For Enterprises
● Educate and enforce. Inform your employees about the threats, train
them to watch out for social engineering tactics, and introduce and/or
enforce guidelines on how to handle a threat if encountered.
Best Practices
● Implement security measures. Create a process to identify
vulnerabilities and address threats in your network. Regularly perform
security audits and make sure all of the systems connected to your
company network are accounted for.
● Keep track of your banking receipts. The first sign of being compromised is
finding strange charges on your account that you did not make.
● Don’t believe everything you see. Social engineering preys on the gullible.
Be skeptical and vigilant.
● Be mindful of what you share on social media. Don’t get carried away. If
possible, don’t reveal too much about yourself on your profile.
Best Practices
● Secure all your devices. These devices include laptops, mobile devices, and
wearables. Ensure that they are protected by security software that is always
updated.
● Secure your accounts. Use a different email address and password for each of
your accounts. You may opt to use a password manager to automate the process.
Data breaches and other cyber attacks are usually a result of lax
authentication, weak passwords, and poor certificate or key
management. Companies often struggle with assigning
permissions to appropriate users or departments, resulting in
identity theft.
To avoid account hijacking
Phishing, fraud, and software exploitations are still very
common. Companies relying on cloud services are especially
at risk because they are an easy target for cybercriminals,
who can eavesdrop on activities, modify data and manipulate
transactions. These third-party applications can be used by
attackers to launch other attacks as well.
To mitigate cyber threats from malicious insiders
You can prevent much of the risk by blocking certain websites. However, this isn’t a
fool-proof system, so you should also include a policy prohibiting employees from
visiting any site that you deem unsafe.
ACTIVITY (25mins)
In your three years of stay in DLSL, what Information Security Policy will you be
proposing? List down at least 5 policies as guide in following security protocols
and procedures.
Top Information Security Threats
Unsecure or Poorly Secured Systems
The speed and technological development often leads to compromises
in security measures.
In other cases, systems are developed without security in mind, and
remain in operation at an organization as legacy systems.
Organizations must identify these poorly secured systems, and
mitigate the threat by securing or patching them, decommissioning
them, or isolating them.
Top Information Security Threats
Social Media Attacks
Many people have social media accounts, where they often unintentionally
share a lot of information about themselves. Attackers can launch attacks
directly via social media, for example by spreading malware via social media
messages, or indirectly, by using information obtained from these sites to
analyze user and organizational vulnerabilities , and use them to design an
attack.
Top Information Security Threats
Social Engineering
Social engineering involves attackers sending emails and messages that trick users into
performing actions that may compromise their security or divulge private information.
Attackers manipulate users using psychological triggers like curiosity, urgency or fear.
Because the source of a social engineering message appears to be trusted, people are more
likely to comply, for example by clicking a link that installs malware on their device, or by
providing personal information, credentials, or financial details.
Organizations can mitigate social engineering by making users aware of its dangers and
training them to identify and avoid suspected social engineering messages. In addition,
technological systems can be used to block social engineering at its source, or prevent users
from performing dangerous actions such as clicking on unknown links or downloading
unknown attachments.
Top Information Security Threats
Malware on Endpoints
Organizational users work with a large variety of endpoint devices, including desktop
computers, laptops, tablets, and mobile phones, many of which are privately owned
and not under the organization’s control, and all of which connect regularly to the
Internet.
Traditional antivirus software is insufficient to block all modern forms of malware, and
more advanced approaches are developing to securing endpoints, such as endpoint
detection and response (EDR).
Top Information Security Threats
Lack of Encryption
Encryption processes encode data so that it can only be decoded by users
with secret keys. It is very effective in preventing data loss or corruption in
case of equipment loss or theft, or in case organizational systems are
compromised by attackers.
Unfortunately, this measure is often overlooked due to its complexity and lack
of legal obligations associated with proper implementation. Organizations are
increasingly adopting encryption, by purchasing storage devices or using
cloud services that support encryption, or using dedicated security tools.
Top Information Security Threats
Security Misconfiguration
Enterprise grade platforms and cloud services have security features, but these
must be configured by the organization. Security misconfiguration due to
negligence or human error can result in a security breach. Another problem is
“configuration drift”, where correct security configuration can quickly become out of
date and make a system vulnerable, unbeknownst to IT or security staff.
PICs and PIPs demonstrate accountability for the data entrusted to them by
implementing measures to secure the data, by retaining data only for as long as
is necessary, and by governing data sharing with third parties and data transfer
arrangements.
The eight rights under the DPA
Aside from these four general principles, the DPA also specifies eight rights of data
subjects. Organisations should ensure that these rights are upheld as they collect,
use, and store the personal data of their customers or employees. These right
rights include:
Data subjects should be informed that their personal data will be collected,
processed, stored. Consent should be obtained when necessary.
Data subjects have the right to obtain a copy of the personal information that an
organisation may possess about them.
The eight rights under the DPA
Data subjects have the right to withdraw or order the removal of their personal
data when their rights are violated.
Data subjects can file a complaint with the National Privacy Commission if their
personal data was misused.
Data subjects have the right to correct any inaccuracy in the personal data an
organisation possesses about them.
Data subjects should be able to electronically move, copy or transfer the data an
organisation holds about them, facilitating free flow of information according to the
data subject’s preferences.
Top 10 Cybercrime Prevention Tips
1. Use Strong Passwords
Use different user ID / password combinations for different accounts and
avoid writing them down. Make the passwords more complicated by
combining letters, numbers, special characters (minimum 10 characters in
total) and change them on a regular basis.
2. Secure your computer o Activate your firewall
Firewalls are the first line of cyber defense; they block connections to
unknown or bogus sites and will keep out some types of viruses and
hackers.
Top 10 Cybercrime Prevention Tips
3. Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN,
etc.) are set to private. Check your security settings. Be careful what information you
post online. Once it is on the Internet, it is there forever!
4. Secure your Mobile Devices
Be aware that your mobile device is vulnerable to viruses and hackers. Download
applications from trusted sources.
5. Install the latest operating system updates
Keep your applications and operating system (e.g. Windows, Mac, Linux) current with
the latest system updates. Turn on automatic updates to prevent potential attacks on
older software.
Top 10 Cybercrime Prevention Tips
6. Protect your Data
Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups of all your important data, and store it in
another location.
7. Secure your wireless network
Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not
properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot
Spots”, are also vulnerable. Avoid conducting financial or corporate
transactions on these networks.
Top 10 Cybercrime Prevention Tips
8. Protect your e-identity
Be cautious when giving out personal information such as your name, address,
phone number or financial information on the Internet. Make sure that websites
are secure (e.g. when making online purchases) or that you’ve enabled privacy
settings (e.g. when accessing/using social networking sites).
9. Avoid being scammed
Always think before you click on a link or file of unknown origin. Don’t feel
pressured by any emails. Check the source of the message. When in doubt, verify
the source. Never reply to emails that ask you to verify your information or confirm
your user ID or password.
Top 10 Cybercrime Prevention Tips
10. Call the right person for help
Don’t panic! If you are a victim, if you encounter illegal Internet content
(e.g. child exploitation) or if you suspect a computer crime, identity
theft or a commercial scam, report this to your local police. If you need
help with maintenance or software installation on your computer,
consult with your service provider or a certified computer technician.