Uneingeschränkter Zugang

Cyber Security Cookbook for Practitioners

   | 11. Nov. 2019

Zitieren

Figure 1.

Factor analysis of information risk
Factor analysis of information risk

Figure 2.

Detect and Identify
Detect and Identify

Figure 3.

Respond and Recover
Respond and Recover

Figure 4.

Insider Threat
Insider Threat

Figure 5.

Vendor/Partner Compromise
Vendor/Partner Compromise

Figure 6.

Compromise of individual device
Compromise of individual device

Figure 7.

Phishing attack
Phishing attack

Figure 8.

Network systembreach
Network systembreach

Figure 9.

Ransomware
Ransomware

Figure 10.

DDOS attack
DDOS attack

Figure 11.

The four faces of CISO
The four faces of CISO

Figure 12.

Guiding principles
Guiding principles

Figure 13.

Preparation–Before event
Preparation–Before event

Figure 14.

Execution-During Incident
Execution-During Incident

Figure 15.

Closing-post incident
Closing-post incident

Figure 16.

Key Metrics
Key Metrics

Figure 17.

Appendix A. Organization Chart
Appendix A. Organization Chart

THE CIO PARTICIPATION AND DELEGATION DURING CYBER EVENTS BASED ON SEVERITY

Cyber Event Participation Levels
PositionExtremeMajorMode rateMinorInsignificant
CIO100%100%50%25%0%
VP IT100%100%75%50%25%
VP Ops100%100%50%25%10%

APPENDIX B. CYBERSECURITY POLICIES

Retrieved from (Touhill & Touhill, 2014, Page 197)
1. Acceptable Use Policy6. Employee Internet UseMonitoring and Filtering Policy11. Remote Access Policy
2. Computer Ethics Policy7. Technology Disposal Policy12. Mobile Device Policy
3. Password Protection Policy8. Physical Security Policy13. Software Policy
4. Clean Desk Policy9. Electronic Mail Policy14. Access Control Policy
5, Use of the Internet Policy10. Removable Media Policy15. Network Management Policy

ENTERPRISE RISK MANAGEMENT LIKELIHOOD

Likethood Table
LevelDescriptorDescriptionFrequency of Occurrence
StrategicOperationalRoutine
1RareMay only occur in exceptional circumstancesLess than once every 50 yearsLess than once every 10 yearsLoss than once every 5 years
2UnlikelyCould occur at some timeAt least once in 20 yearsAt least once in 5 yearsAt least once in 3 years
3PossibleMight occur at some timeAt least once in 5 yearsAt least once per yearAt least once per year
4LikelyWill probably occur in most circumstancesAt least once por yearAt least once per quarterAt least once per month
5Almost CertainExpected to occur in most circumstancesMore than once per yearAt least once per monthAt least once per

ENTERPRISE RISK MANAGEMENT CONSEQUENCES

Consequences Table
Impact1 Insignificant2 Minor3 Moderate4 Major5 Extreme
SafetyNo injuriesFirst aid treatmentMedical treatment, lost timeMedical treatment, extensive injuriesFatalities
Financial Loss< $50k or 0.5% of OB$50k - S250k or 1% of OBS250k - $3M or 2% of OB$3m - $1Om or 6% of OB> $10m or > 10% of OB
Assat LossLittle or no impact on assetsMinor loss or damage to assetsMajor damage to assetsSignificant loss of assetsComplete loss of assets
Interruption to Services< ½ day½ - 1 day1 day - 1 week1 week - 1 month> 1 month
Information Management Inaccurate data entryLoss or corruption of databaseFailure of backup dataSystem faliure and/or extensive hacking attack
Legislative Compliance Broach of RegulationsWarning from RegulatorSuccessful ProsecutionCessation of Activities
Management EffortAn event, the impact of which can be absorbed through normal activityAn event, the consequences of which can be absorbed but management effort is required to minimise the impactA significant event which can be managed under normal circumstancesA critical event which with proper management can be enduredA disaster with the potential to lead to the collapse of the University
Reputation and ImageUnsubstantiate d, low impact, low profile or no news itemsSubstantiated, low impact, low news profileSubstantiated, public embarrassment, moderate impact, moderate news profileSubstantiated, public embarrassment, high impact, high news profile, third party actionsSubstantiated, public embarrassment, very high multiple impacts, high widespread news profile, third party actions

THE CIOO AND THE APPROPRIATE RACI DIAGRAM

RoleAssess RiskManage RiskFundImplementAssure
Application OwnerIR, AR, AAA
ITICIRI
Operational RiskR, AIIIC
SecurityCcIIR

APPENDIX D. CHECKLIST FOR CEO(EXECUTIVES IN GENERAL)

Appendix D. Checklist for CEO (Executives in general)
Retrieved from (Vantage Point, 2016)
Before an Incident
1 - Stay current on the latest threads and cyber security best practices4 - Research, design, and deploy security technology. Consider access control, data security, training, processes, and procedures7 - Ensure the response plan covers communications, analysis, mitigation, and other critical tasks10 - Discuss with counsel whether cybersecurity risk factors in the company should be disclosed (i.e. SEC 10-K filings) in public
2 - Designate a board committee tasked with cyber security responsibilities. Establish links between board and C-level executives, specially CIO and CISO5 - Develop and deploy the appropriate systems to identify a cyber security event as soon as possible8 - Run practice drills to test the plan and revise it as needed11 - Obtain liability insurance specifically covering cyber security risk for directors and officers as well as for the corporation
3 - Identify the firm’s security posture and the risks to the company. Assess the company’s systems, assets, data, and capabilities. And identify risks unique to your industry6 - Create an incident response plan that lays out who reports to whom. Build m contingencies in case some people are unavailable at the time of an incident9 - Establish a recovery plan to restore any capabilities or services impaired by a breach and to protect the company from further attacks12 - To limit the company’s liability in certain kinds of attacks, consider cyber security vendors certified by U.S. Department of Homeland Security’s SAFETY (“Support Anti-Terrorism By Fostering Effective Technologies”) Act

ONE EVENT FOLLOWED BY ANOTHER

During an Incident
1 - Oversee an incident response. Serve as a conduit between incident responders within the company and external stakeholders including customers, partners, and regulators2 - Understand that news of the incident usually comes to the company from outsiders, such as law enforcement or partner companies. Keeping the event under wraps is no longer very likely3 - Work closely with your legal counsel and public relations team to advise C-level executives about how to disclose incident details, especially to news media. Don’t disclose facts until they’ve been verified4 - Stay in touch with your response team to assist as needed during response and through remediation
After an Incident
1 - After a breach has been repaired, intruders ejected, and systems restored, assist in damage control to fix the company’s infrastructure and reputation2 - Review incident response to assess how it went. Identify weaknesses in equipment, systems, and procedures to determine where to make improvements3 - With guidance from your legal counsel, determine how to make customers whole if their data was exposed or stolen4 - Consider offering free credit monitoring, issuing new account numbers, and so on. Identify the “chum rate”. Counsel can advise as to any consumer remedies required by law

APPENDIX C. CYBER SECURITY METRICS

QuestionMetric CategoryMetric
How Vulnerable Are We1.0Number of Threats Detected
1.0.1How many times are we being “pinged” and “probed”?
1.0.2How much spam is filtered?
1.0.3How many phishing messages are we receiving?
1.0.4Who is targeting us?
1.1Number of Known Vulnerabilities
1.1.1System vulnerabilities
1.1.1.1Number of vulnerabilities discovered
1.1.1.2Percentage of vulnerabilities mitigated in prescribed time frames
1.1.1.3Number of residual vulnerabilities
1.1.2Other Vulnerabilities
1.1.2.1Percentage of systems and devices beyond projected life span
1.1.2.2Percentage of software beyond projected life span
1.2How Many Cyber security Incidents Have We Detected?
1.2.1Number of cybersecurity incidents detected
1.2.2Number of detected cybersecurity incidents by category
1.2.3Cost per incident
1.2.4Who is responsible for cyber security incidents
How Effective Are Our Systems and Processes?2.0Network Performance Measures
2.0.1Network Performance Measurement
2.0.2How does network performance compare to previous measurements?
2.0.3Percentage of devices with current security software
2.1Change Management
2.1.1Number of unauthorized changes, Unauthorized changes to your systems are not good
2.1.2Percentage of maintenance successfully accomplished within schedule and budget
2.2Software configuration management
2.2.1Percentage of software current with all known patches. This is a critical cybersecurity measure. It makes sense to patch your soft
2.2.2Number of unauthorized software and media detected on network and devices
2.3Physical Security
2.3.1Number of physical security incidents allowing unauthorized access into facilities
2.3.2Number of violations of clean desk policy
2.4Acquisition
2.4.1Percentage of System and service contracts that include security Requirements and/or Specifications
Do we have the right people, are they properly trained, and are they following proper procedures?3.0Percentage of employees who have current Cybersecurity training
3.1Percent of technical staff with current certifications
3.2Number of Users with system administrator privileges
3.3Number of security violations during reporting period
3.4Percentage of security incidents/violations reported within required timelines
Am I Spending the Right Amount on Seurity?4.0Cyber security Costs
4.0.1Percentage of the IT budget devoted to cybersecurity
4.0.2Percentage of the organization budget devoted to cybersecurity
4.0.3Execution of current budget
4.1Value of Information
4.2Consequences of Information loss, Tampering, or Destruction
4.2.1Cost to replace
4.2.2Estimated costs associated with loss, tampering, or destruction of information
4.2.3Estimated costs associated with regulatory fines for failing compliance
4.3Cybersecurity Risk Exposure
4.3.1Cybersecurity risk

CYBERSECURITY ACTORS. SOURCES: FORTUNE AND MCAFEE

AttackerWhoObjectivesTargetsSignatureLikelihoodConsequencesClassic Case
State sponsoredChina, Iran, Israel. Russia, U.SIntelligence, state secrets, sabotageForeign governments, terrorists, industryMulti-tiered, precisely orchestrated attacks that breach computer systemsPossibleMajorOne-fifth of Iran’s nuclear centrifuges crashed after Stuxnet, a worm reportedly developed by U.S. and Israeli intelligence, penetrated computers at an Iranian enrichment facility, Irar allegedly retaliated by disrupting access to the websites of J.R Morgan (JPM, +1.25% ), PNC (PNC. +1.27% ), Wells Fargo (WFC, -1.05% ) and others.
HacktivistsAnonymous, AntiSec, LulzSecRighting perceived wrongs, publicity, protecting Internet freedomsBullies, Scientologists, corporations, governmentsLeaking sensitive information, public shaming, creepy YouTube videosLikelyMinorThe websites of PayPal. Visa (V, +0.30%). and MasterCard (MA, -0.05%)were disrupted during Operation Payback, an Anonymous-led effort to punish companies that suspended the accounts of WikiLeaks in 2010. Some $5.6 million was lost by PavPal alone.
Cyber Criminals or black-hat hackersNigerian “princes,” carders, identity thieves, spammersTreasureThe gullible, online shoppers, small businesses, data-rich health care and retail companiesStealing data, looting bank accountsPossibleMinorCoreflood, malicious software that records keystrokes and passwords, infected 2.3 million computers in 2009, some in police departments, airports, banks, hospitals, and universities. Affected companies suffered six-figure fraudulent wire transfers.
InsiderDisgruntled employees, contractors, whistleblowersScore-settling, leaks, public goodLarge companies, governmentsDocument theftUnlikelyMajorMaroochy Shire, an Australian district along the Sunshine Coast in Queensland, was inundated with millions of gallons of untreated sewage in 2001 when a contractor hacked and took control of 150 sewage-pumping stations. He had been passed over for a job with the district. His dirty work cost Maroochy Shire upwards of $1 million.
Script KiddiesBored youthThrills, notorietyLow-hanging fruit such as unprotected websites and e-mail accountsDefacing or dismantling websitesLikelyInsignificantAn e-mail subject-lined I LOVE YOU duped people -- some of them inside the Pentagon - in 2001. The virus it contained, which originated in the Philippines, destroyed files and simultaneously replicated itself, seeding in-boxes as it went. The so-called Love Bug caused an estimated $10 billion in digital damage and lost productivity.
Vulnerability BrokerEndgame, Netragard, VupenHacking as legitimate businessAgnosticFinding so-called zero-day exploits - ways to hack new software, selling them to governments and other deep-Docketed clientsRareMinorFrench firm Vupen hacked Google’s (GOOG, +0.44%) Chrome browser at a security conference last March. Rather than share its technique with the company (and accept a $60,000 award), Vupen has been selling the exploit to higher-paying customers.
Cyber TerroristsTerroristsSpread fear, terror and commit murdernon-believers in their political or religious beliefscreate fear and chaos by disrupting critical infrastructurePossibleModerateArdit Ferizi was arrested in Malaysia charged in October 2015 with stealing the data belonging to the US service members and passing it to the members of the ISIS with the intent to support them in arranging attacks against Western targets
Spy hackersHackers working for competing corporationsSteal trade secretsSpecific corporationsLeak information that are critical to victim’s organizationPossibleMajorChinese cyber spying of US for military and political reasons.
eISSN:
2470-8038
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, andere