Tuesday, August 30, 2016

Cyber Security: Information as an asset

Information as an asset

Coursera Business Vertical

You’ll remember from Week 1 that, when thinking about computer security, it helps to think of information as an asset. Just like money in the bank, it is valuable, possibly irreplaceable, and crucially it can be lost or stolen.

When we think about our assets, traditionally we consider tangible things such as money, property, machinery and so on. Increasingly, it is recognised that information itself is an asset, crucial to adding value. In today’s digital world, it is increasingly apparent that information is the most important asset, for both businesses or individuals – just think of the value of music to a media company or a games program to a video game company.


Coursera CSLearn Data Science, Digital Marketing, Business Foundations & More. Start Learning.   
Considering information as an asset allows us to create strategies for protecting information and minimising the consequences of any disaster.

Case study: San Francisco Medical Center
In October 2002, the University of California, San Francisco Medical Center received an email message from someone who claimed to be a doctor working in Pakistan and who threatened to release patient records onto the internet unless the money owed to her was paid. Several confidential medical transcripts were attached to the email.

UCSF staff were mystified, they had no dealings in Pakistan and certainly did not employ the person who sent the email. The Medical Center began an immediate investigation, concentrating on their transcription service, which had been outsourced to Transcription Stat, based in nearby Sausalito. It transpired that Transcription Stat farmed out work to 15 sub-contractors scattered across America. One of these sub-contractors was Florida-based Sonya Newburn, who in turn employed further sub-contractors, including Tom Spires of Texas. No one at Transcription Stat realised that Spires also employed his own sub-contractors, including the sender of the email. The sender alleged that Spires owed her money, and had not paid her for some time.

 Coursera Arts & Humanities

Newburn eventually agreed to pay the $500 that the email sender claimed was owed to her. In return the sender informed UCSF that she had had no intention of publicising personal information and had destroyed any records in her care. Of course, there is no way to prove that the records have actually been destroyed.

Naturally, you would not wish your own medical records to be publicised: they should be secure. This threat cost the organisation little in monetary terms, but how much in reputation? Just what is a reputation worth? Or, to put it another way, how much should you invest in information security to protect a reputation?

Master Big Data with UCSD and Coursera Learn Social Media Marketing with Northwestern and Coursera

Information in this context is a very broad term and it applies to large and small organisations as well as to individual users. So a doctor’s surgery’s information assets would include things such as personal medical records, telephone contact lists, its emails as well as personal information about its employees. A manufacturing company will have electronic records of order books, correspondence with suppliers and customers, staff records, bank references and so on.

Risk management
Information security risk management assesses the value of information assets belonging to an individual or an organisation and, if appropriate, protects them on an ongoing basis.

Information is stored, used and transmitted using various media; some information is tangible, paper for example, and it is relatively straightforward to put in place strategies to protect this information – such as locking filing cabinets, or restricting access to archives.

On the other hand, some information is intangible, such as the ideas in employees’ minds, is much harder to protect. Companies might try to secure information by making sure their employees are happy, or by legal means such as having contracts that prevent people leaving and going to work for a rival.

Become a Web Developer in 2016 with Coursera Top Computer Science Specializations on Coursera

Imperatives and incentives
Information security risk management considers the process in terms of two factors: imperatives or incentives. Imperatives are pressures that force you to act. Incentives are the rewards and opportunities that arise from acting.

The imperatives for information security arise from legislation and regulation. The Computer Misuse Act and the Data Protection Act, are examples of legislative imperatives. Regulatory imperatives include standards such as the Payment Card Industry Data Security Standard (PCI-DSS), which specifies how merchants should secure all card transactions.

The most important incentive is trust. People and organisations are more likely to work with other people and organisations who have secured their information. Establishing this trust requires that the parties involved examine each others’ information security practices to ensure that there are adequate safeguards to protect the information. One way of doing this is to show that the organisation has satisfied the requirements of standards such as PCI-DSS or the ISO27000 family of standards for designing and implementing information security management systems.

Coursera Data Science   


Risk analysis
We use the term risk in everyday speech, but a whole science has grown up around the identification, analysis and management of risks. You will now look briefly at how to apply some of these ideas to identifying, assessing and reducing risks that affect the security of your information.

Risk can be thought of as the chance of adverse consequences or loss occurring. Generally, risks can be identified and the likelihood of them occurring assessed.

The main technique for a qualitative analysis of risk is to construct a likelihood–impact matrix in which the likelihood and impact of each risk event are assessed against a defined scale and then plotted on a two-dimensional grid. The position on the grid represents the relative significance of each risk. The simplest matrix is formed by classifying both likelihood and impact as either high or low, which leads to a 2 by 2 grid. This basic classification of a high or low value leads to the following rank order for tackling risks:

  • high-impact, high-likelihood risks
  • high-impact, low-likelihood risks
  • low-impact, high-likelihood risks.

Coursera CS

 

Risk analysis in practice

Let’s think about a practical example of how qualitative risk analysis could be done for Lewis’s information assets.
Any successful attack on email, banking details and password information will have high impact and there is a high likelihood that these attacks will be targeted due to their high value. So they should go in the high-high box.
A matrix showing the risk level and likelihood of risks occurring. Under high likelihood, high impact, Email, Banking details and Password are listed.
An attack that affects the study materials or digital photographs will have high impact, but there is a low likelihood given that these assets have minimal financial value to an attacker. These should be placed in the high-low box.
A matrix showing the risk level and probability of risks occurring. Under low likelihood, high impact, Study materials and Digital photographs are listed.
An attack on the digital music or videos will have low impact, since these can be downloaded again easily. However, this will have high likelihood because these assets can be easily copied and sold, this making these attractive to an attacker. Therefore, they go in the low-high box.
A matrix showing the risk level and probability of risks occurring. Under high likelihood, low impact, Digital music and Digital videos are listed.
Conducting a risk analysis is an important part of protecting your information assets. Following Lewis’s example consider your own list of information assets and carry out a similar risk analysis to determine the impact and likelihood of attack for each type of information.

Coursera Data Science

 

31 comments:

  1. Its a great pleasure reading your article.Its full of information I am looking for and I love to post a comment that "The content of your post is awesome" Great work. It was really good to know about Managed Security Florida. Keep up the good work. Thanks for the sharing such a nice article.

    ReplyDelete
  2. Thanks for the detailed blog.The blog post is informative,It consist of valuable information about what a audience basically look forward.You may also visit to the Global Tech Council to get the best deal that you are looking foward.

    Visit -Information security certificate online

    ReplyDelete
  3. I accept there are numerous more pleasurable open doors ahead for people that took a gander at your site.
    ISO 27001 Certification Bahrain

    ReplyDelete

  4. Thanks for the detailed blog.The blog post is informative.I really appreciate the blog post.For more information viist to global tech council to get the buy best deal.Global tech Council is leading a team of highly skilled professionals to deliver online cybersecurity training and certification at the best price. We deliver high benchmark service that matches the need of the customer and fit in the budget. If you are looking further for a rewarding career in the cybersecurity field then visit Global tech Council www.globaltechcouncil.org website in just one click and get the best deal.

    Visit- Cyber security professional

    ReplyDelete
  5. I visited your blog you have shared amazing information, i really like the information provided by you, You have done a great work. I hope you will share some more information regarding Cyber Security. I appreciate your work.

    Cyber security certificate

    ReplyDelete
  6. Great Post. Thank you for sharing.

    ReplyDelete
  7. Nice information…very well and clearly explained… Thank you so much for this valuable information…Great work keep doing. Looking for the best cyber security services in Hyderabad at affordable prices contact cyanous software solutions.

    Best cyber security services in Hyderabad
    Best software & web development company in Hyderabad

    ReplyDelete
  8. Thanks for sharing such valuable information. Data security & cyber security company offers managed IT services in Lexington, KY. A dedicated team of engineers remotely monitor and manage the security and health of your servers and workstations.
    cloud backup services

    ReplyDelete
  9. Thanks for making this blog helpful for me! I am doing online Cyber Security Training & Certification I would like to thank for the efforts you have made in writing this post. Thanks for sharing.

    ReplyDelete
  10. This comment has been removed by the author.

    ReplyDelete
  11. This is one of the best blog i have came through. Penetration Testing Expert offers cyber security risk assessment services. Contact us today!
    cyber security solutions

    ReplyDelete

  12. <a href="https://telegra.ph/Learn-Cyber-Security-Training-Course-Effectively-03-02
    >Cyber Security training in Gurgaon
    </a>

    ReplyDelete
  13. Very nice post! For best and reliable cyber security services and consultancy please contact us at:
    best cybersecurity services
    security and management solutions
    advanced cybersecurity consultancy

    ReplyDelete
  14. Wonderful Post. This is a very helpful post. These are the useful tips for. I would like to share with my friends. To know more about me visit here MS-101T02: Microsoft 365 Compliance Management

    ReplyDelete
  15. Hi Thanks for sharing nice information, If you are searching Cyber Security Training in USA, Please visit here.

    ReplyDelete
  16. Looking for the Best Cybersecurity Team to protect your business against cyber threats? Syscom is a Cybersecurity Solution Provider in Dubai, UAE

    For More Information Visit Here -- Cybersecurity solutions

    ReplyDelete
  17. Great article shared about Cyber security. Cyber security is one of the most talked-about topics these days. With the advancement of technology, the internet has made its place on the top of the priority list for everyone. A few months ago I have taken the services from SAITECH INCORPORATED, which provides an extensive technology solution provider encompassing domains such as cloud computing, hardware and software engineering, cyber security, and more.

    ReplyDelete
  18. Protect your business with top-notch cybersecurity solutions and 24/7 monitoring from a trusted Managed Security Services Provider (MSSP).


    WyDur's Managed Endpoint Security solutions offer advanced protection against cyber attacks. With our cutting-edge technology and experienced team, you can rest assured that your devices and network are fully protected. Trust WyDur to keep your business safe and secure.


    Managed Security Services in Hyderabad

    ReplyDelete
  19. Cyber security is much required against threat as most common links are used to attack | http://www.digitaltrackgulf.com has the best Cyber Security solutions for real-time threats.

    ReplyDelete
  20. I really liked your blog and I got many information from your blog thank so much for sharing this blog with us. cyber defense services in the UAE also provide assistance in responding to cyber attacks, helping companies to quickly and efficiently recover from a breach. Visit here also…
    Cyber defense services UAE

    ReplyDelete
  21. This is an informative blog. Thank you for sharing it. We provide various exclusive security solutions. Please explore more about DigitalTrack Gulf here Security Solutions in Dubai

    ReplyDelete
  22. Many thanks to everyone who made Cybersecurity Awareness .

    ReplyDelete
  23. What is hacking in cyber security?
    Hacking in cyber security services refers to the practice of exploiting vulnerabilities in computer systems, networks, or software to gain unauthorized access or cause harm. Hackers can use various techniques, such as phishing, malware, or exploiting software bugs, to infiltrate systems. While hacking is often associated with illegal activities, ethical hacking, or "white-hat hacking," is used by cybersecurity professionals to identify and fix security weaknesses to protect against malicious attacks.

    ReplyDelete