Easy Steps to Managing Cybersecurity
eBook - ePub

Easy Steps to Managing Cybersecurity

Jonathan Reuvid, Jonathan Reuvid

  1. 146 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

Easy Steps to Managing Cybersecurity

Jonathan Reuvid, Jonathan Reuvid

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats. Providing an insight to the extent and scale a potential damage could cause when there is a breech in cyber security. It includes case studies and advice from leading industry professionals, giving you the necessary strategies and resources to prevent, protect and respond to any threat:

  • Introduction to cyber security
  • Security framework
  • Support services for UK public and private sectors
  • Cyber security developments
  • Routing a map for resilience
  • Protecting financial data
  • Countermeasures to advance threats
  • Managing incidents and breaches
  • Preparing for further threats
  • Updating contingency plans

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Easy Steps to Managing Cybersecurity un PDF/ePUB en línea?
Sí, puedes acceder a Easy Steps to Managing Cybersecurity de Jonathan Reuvid, Jonathan Reuvid en formato PDF o ePUB, así como a otros libros populares de Betriebswirtschaft y Unternehmensstrategie. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Año
2018
ISBN
9781787197954

PART ONE

Cyber security – No Longer an Option

illustration

1.1

INTRODUCTION TO CYBER SECURITY RISK

Ben Johnson, Sam Millar and Helen Vickers DLA Piper UK
Cyber crime is a broad term encompassing any crime committed by way of a computer or the internet. We acknowledge that cyber crime is an extremely complex subject; however, we aim to provide readers with an introduction to cyber security risk and to emerging best practice. Cyber crime is a constantly evolving threat. Recent analysis shows that cyber crime cost the UK more than £1.5 billion in 2015.1 Reading about high profile cyber breaches in the news is becoming the norm. Recent examples of victims of high-profile attacks include Ashley Madison and TalkTalk. The effects of these breaches are clear – a loss of customer data or disruption to service coupled with reputational damage. Often the reputational effects are the most damaging: months after the attack on TalkTalk, its stock market value was still almost £1 billion less than on the day the attack was announced.2
As a result, cyber security is becoming a priority for many businesses. Some small businesses are going so far as to stock up on digital currencies to pay the ransoms of hackers in potential future cyber attacks.3 However, despite the disruption and huge cost a cyber attack can cause to a business, many businesses are not taking the issue seriously enough.
In a recent survey undertaken for the Government, 69% of businesses said that cyber security was a high priority for senior managers. However, only 51% of companies have taken recommended actions to identify cyber risk. Only 29% have formal written cyber security policies. Only 10% have a formal incident management plan. This lack of vigilance seems entirely out of step with the fact that 65% of businesses surveyed had detected a cyber security breach or attack in the last year.4 There are myriad statistics in a vast number of surveys relating to cyber security. Without listing them all, the pattern that emerges is that firms, on the whole, are not taking cyber security seriously enough.5
There is a schism between the reality of cyber security risk and the number of businesses engaging sufficiently seriously with the threat.

TYPES OF THREAT

There are manifest types of cyber-threats of which businesses should be wary. Some businesses are more at risk than others from certain types of threat.

• FRAUD

The vast majority of cyber incidents fall into the category of fraudulent attacks. These include identity theft, attempts at extortion, and other crimes which specifically target individuals or employees.6 Fraudulent attacks often take the form of phishing emails containing ransomware which are sent to employees. A high-ranking employee or executive could receive an email saying that a significant amount of sensitive data has been stolen and will be released publicly on a certain date unless a large sum is paid. The deadline will rarely allow sufficient time for the investigation of such an incident.7 Cyber-attackers in these cases are most often motivated by money.

THEFT OF PAYMENT CARD DATA

As we all know, criminals will frequently target locations where they can obtain the most money quickly. Cyber-criminals are no different and arguably, theft of payment card data was the forerunner to what we know as cyber crime today. Criminal gangs are able to launch cyber attacks on businesses which accept or process card payments; for example, by hacking into till systems and leaving software capable of sitting undetected in a system whilst copying card details before that data is extracted to the criminal. Such data is then sold through web-sites to others who are capable of creating plastic cards which are then used to make expensive purchases in countries where PIN numbers are not required.
Card data compromise remains one of the largest areas of potential liability for any party in the payment chain and accordingly careful steps must be taken to guard against losses. We identify below some of the key issues arising in this area.

MERCHANT ACQUIRER OBLIGATIONS

Visa, MasterCard and other card schemes impose upon their merchant acquirer (payment processor) the obligation of ensuring payment card data security of merchants (entities accepting payment cards). The card schemes also administer, as part of their membership rules, methods of fining members who do not comply with data security obligations, and ensuring card issuers are compensated for losses arising from card data breaches.
Acquirers will then impose contractual obligations on merchants to ensure card data is kept securely and will require an indemnity for losses which result from a breach. It is important to understand the potential magnitude of such losses.

PCIDSS COMPLIANCE

Irrespective of whether a data compromise has occurred, the card schemes require members to ensure that they and merchants and third parties handling data on their behalf comply with the Payment Card Industry Data Security Standards (“PCIDSS”). This is a set of standardised obligations (often updated) regarding data security that a number of card schemes (Visa and MasterCard included) agree to enforce. Examples of obligations are: (i) installing appropriate firewalls; (ii) ensuring public access to systems is controlled; (iii) changing vendor passwords on software etc. This information can be accessed at www.pcidss.co.uk.

POTENTIAL LIABILITIES

As acquirers will pass liabilities arising from payment card data breaches to merchants, it is important to understand what these losses may be. These will equate to:
• Significant fines for failing to ensure a merchant is compliant with PCIDSS. It is worth noting that attaining PCIDSS compliance on any particular data does not provide a merchant with protection. Should a data compromise occur in respect of its card data, then there is real risk that a breach of PCIDSS is assumed.
• Card Schemes mandate immediate and urgent forensic investigation of events and the costs of that forensic investigation will be borne by the merchant. Obligations can include requiring a merchant to identify, contain and mitigate the incident, secure all card data and preserve all information/evidence concerning the event within 24 hours. It must document all actions and not reboot any systems. Card Schemes must be constantly updated. Remediation plans must be implemented in a matter of days.
• Card Schemes maintain a process which means they will manage the recovery of losses which Card Issuing banks have incurred as a result of the payment card data breach. These amount to fraud losses that cardholders suffer whilst criminals utilise their card numbers to make purchases.
• Other losses which card schemes enable recovery of are the additional costs which card issuers have suffered for:
• Reissuing potentially compromised cards; and
• Heightened monitoring of non-reissued cards.
Losses can run into millions of pounds and the consequences of an incident do not stop there. Given the significant impact card data loss might have on your business, it is imperative that steps are taken to comply with PCIDSS to ensure the security of systems and those with whom you contract to receive services. If in doubt engage with the rules and your payment processor, who will be able to guide you as needed.

TERMINATION

A retailer can easily find their merchant services agreement terminated due to breach of contract. The Card Schemes operate systems which can make obtaining another facility difficult when you have been terminated for breach of contract and accordingly, suffering a payment card data breach can spell the end of a business.

• DISRUPTION

Disruptive cyber attacks are intended to severely disrupt a business’ operations. These can be instigated by certain agencies, governments, or even sophisticated terrorist groups, using the attacks as a way to make their presence felt.8 For example, the North Korean government’s disruptive cyber attack on Sony Pictures in relation to the film The Dictator intended to express its distaste for the depiction of Kim Jong-Un. Such attacks are also undertaken by political groups; for example, part of the Anonymous ‘hacktivist’ network took down the London Stock Exchange’s website for more than two hours as part of its campaign against the world’s banks and financial institutions.9 Disruptive attacks may also be undertaken for commercial gain.

• SYSTEM FAILURE

This type of cyber attack would cause an inciden...

Índice

  1. Cover
  2. Title
  3. Copyright
  4. Contents
  5. Foreword
  6. Part One: Cyber Security – No Longer an Option
  7. Part Two: International Action in Cyber Security
  8. Part Three: Preparation
  9. Part Four: Prevention
  10. Part Five: Protection and Response
  11. Book Summary
  12. Acknowledgements
  13. Appendix: Contributors contacts
  14. References
Estilos de citas para Easy Steps to Managing Cybersecurity

APA 6 Citation

[author missing]. (2018). Easy Steps to Managing Cybersecurity ([edition unavailable]). Legend Press. Retrieved from https://www.perlego.com/book/990406/easy-steps-to-managing-cybersecurity-pdf (Original work published 2018)

Chicago Citation

[author missing]. (2018) 2018. Easy Steps to Managing Cybersecurity. [Edition unavailable]. Legend Press. https://www.perlego.com/book/990406/easy-steps-to-managing-cybersecurity-pdf.

Harvard Citation

[author missing] (2018) Easy Steps to Managing Cybersecurity. [edition unavailable]. Legend Press. Available at: https://www.perlego.com/book/990406/easy-steps-to-managing-cybersecurity-pdf (Accessed: 14 October 2022).

MLA 7 Citation

[author missing]. Easy Steps to Managing Cybersecurity. [edition unavailable]. Legend Press, 2018. Web. 14 Oct. 2022.